O'Reilly logo

Fuzzing: Brute Force Vulnerability Discovery by Pedram Amini, Adam Greene, Michael Sutton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17. Web Browser Fuzzing

 

“One of the common denominators I have found is that expectations rise above that which is expected.”

 
 --George W. Bush, Los Angeles, September 27, 2000

Client-side vulnerabilities have quickly moved into the spotlight as they are being heavily leveraged by attackers to facilitate phishing attacks, identity theft, and the creation of large bot networks (botnets). Vulnerabilities in Web browsers offer a target-rich environment for such attacks as a weakness in popular browsers results in the exposure of millions of unsuspecting victims. Client-side attacks always require some form of social engineering, as the attacker must first coerce a potential victim to visit a malicious Web page. Often this process can be facilitated ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required