O'Reilly logo

Fuzzing: Brute Force Vulnerability Discovery by Pedram Amini, Adam Greene, Michael Sutton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. File Format Fuzzing: Automation on Windows

 

“It’s in our country’s interests to find those who would do harm to us and get them out of harm’s way.”

 
 --George W. Bush, Washington, DC, April 28, 2005

In the previous chapter, we looked into automating file format fuzzing on the UNIX platform. We’ll now switch to uncovering file format vulnerabilities within Windows applications. Although the overall concept remains consistent, there are important differences that we’ll attempt to highlight. First off, Windows programming by nature lends itself to graphical tool design so we’ll stray from the command-line applications presented in the last chapter and build a fancy GUI for the script kiddies. We also spend time identifying appropriate file ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required