![]() To gain 45-day Safari Enabled access to this book: Safari Bookshelf is an electronic reference library that lets you easily search thousands of technical books, find code samples, download chapters, and access technical information whenever and wherever you need it. When you buy this book, you get free access to the online edition for 45 days. Corporate and Government Sales 80 For sales outside the United States, please contact: International Sales This Book Is Safari Enabled The Safari® Enabled icon on the cover of your favorite technology book means the book is available through Safari Bookshelf. ![]() For more information, please contact: U.S. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The author and publisher have taken care in the preparation of this book but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks.Citation previewįuzzing This page intentionally left blank Fuzzing BRUTE FORCE VULNERABILITY DISCOVERY Michael Sutton Adam Greene Pedram Amini Upper Saddle River, NJ Hybrid Approaches to Vulnerability Discovery. First-Chance Versus Last-Chance Exceptions. Custom Fuzzer Case Study: Shockwave Flash. Chapter 20 In-Memory Fuzzing: Automation. ![]() Chapter 16 Network Protocol Fuzzing: Automation on Windows. Chapter 15 Network Protocol Fuzzing: Automation on UNIX. Case Study: RealPlayer RealPix Format String Vulnerability. Chapter 12 File Format Fuzzing: Automation on UNIX. Chapter 10 Web Application and Server Fuzzing: Automation. Chapter 5 Requirements for Effective Fuzzing. Chapter 1 Vulnerability Discovery Methodologies. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |