O'Reilly logo

Fuzzing: Brute Force Vulnerability Discovery by Pedram Amini, Adam Greene, Michael Sutton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Fuzzing Methods and Fuzzer Types

 

“Too many good docs are getting out of the business. Too many OB/GYNs aren’t able to practice their love with women all across this country.”

 
 --George W. Bush, Poplar Bluff, Mo., September 6, 2004

Fuzzing defines an overall approach to vulnerability discovery. However, under the umbrella of fuzzing you will find various individual methods for how to implement the methodology. In this chapter we begin to dissect fuzzing by looking at these unique methods. We also look at different types of fuzzing that employ these methods and are leveraged against specific classes of targets. Part II of the book is dedicated to dissecting each of these fuzzer types in much greater detail.

Fuzzing Methods

In the previous ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required