Fuzzing and Vulnerabilities Search

Abstract

Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search

    Similar works

    Full text

    thumbnail-image