Getting ready

Before we jump to the Metasploit fuzzer modules, let's have a brief overview of fuzzing and its types.

The Metasploit Framework provides a complete set of libraries to manipulate network protocols and data that can help us develop a simple fuzzer.

Depending on the type of application or protocol that we are targeting, we can set up our fuzzer to generate data/packets to test for overflow conditions. Metasploit contains several fuzzer modules that can be used to test applications and protocols. These modules can be located in modules/auxiliary/fuzzers. Let's analyze the implementation of these modules.

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.