Fuzzing and Vulnerabilities Search

Article English OPEN
Stanislav Evgenyevich Kirillov; Nikolai Petrovich Lavrentiev;
  • Publisher: Moscow Engineering Physics Institute
  • Journal: Bezopasnostʹ Informacionnyh Tehnologij (issn: 2074-7128, eissn: 2074-7136)
  • Publisher copyright policies & self-archiving
  • Subject: Information technology | T58.5-58.64 | Q350-390 | Information theory | vulnerabilities search | data format reverse engineering

Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.
Share - Bookmark