Fuzzing brute force vulnerability discovery

Saved in:
Bibliographic Details
Main Author: Sutton, Michael
Other Authors: Greene, Adam, Amini, Pedram
Format: Book
Language:English
Published: Upper Saddle River, NJ Addison-Wesley 207
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 49166
003 MY-KLNDU
005 20241219005635.0
008 130723 2007 njua i 000 0 eng d
020 |a 9780321446114 
020 |a 0321446119 
039 9 |a 201312031250  |b zul  |c 201312031247  |d zul  |c 201307230912  |d azraai  |y 201307230911  |z azraai 
040 |a UPNM 
090 |a QA 76.9.A25  |b S88 2007 
100 1 |a Sutton, Michael 
245 1 0 |a Fuzzing  |b brute force vulnerability discovery  |c Michael Sutton, Adam Greene, Pedram Amini 
260 |a Upper Saddle River, NJ  |b Addison-Wesley  |c 207 
300 |a xxvii, 543 p.  |b ill.  |c 23 cm. 
500 |a Includes index 
505 |a Foreword xix Preface xxi Acknowledgments xxv About the Author xxvii P ARTI B ACKGROUND 1 Chapter 1 Vulnerability Discovery Methodologies 3 Chapter 2 What Is Fuzzing? 21 Chapter 3 Fuzzing Methods and Fuzzer Types 33 Chapter 4 Data Representation and Analysis 45 Chapter 5 Requirements for Effective Fuzzing 61 P ART II T ARGETS AND A UTOMATION 71 Chapter 6 Automation and Data Generation 73 Chapter 7 Environment Variable and Argument Fuzzing 89 Chapter 8 Environment Variable and Argument Fuzzing: Automation 103 Chapter 9 Web Application and Server Fuzzing 113 Chapter 10 Web Application and Server Fuzzing: Automation 137 Chapter 11 File Format Fuzzing 169 Chapter 12 File Format Fuzzing: Automation on UNIX 181 Chapter 13 File Format Fuzzing: Automation on Windows 197 Chapter 14 Network Protocol Fuzzing 223 Chapter 15 Network Protocol Fuzzing: Automation on UNIX 235 Chapter 16 Network Protocol Fuzzing: Automation on Windows 249 Chapter 17 Web Browser Fuzzing 267 Chapter 18 Web Browser Fuzzing: Automation 283 Chapter 19 In-Memory Fuzzing 301 Chapter 20 In-Memory Fuzzing: Automation 315 P ART III A DVANCED F UZZING T ECHNOLOGIES 349 Chapter 21 Fuzzing Frameworks 351 Chapter 22 Automated Protocol Dissection 419 Chapter 23 Fuzzer Tracking 437 Chapter 24 Intelligent Fault Detection 471 P ART IV L OOKING F ORWARD 495 Chapter 25 Lessons Learned 497 Chapter 26 Looking Forward 507 Index 519 
592 |b 18/6/13  |c Hadiah & Sumbangan  |h Darul Risalah Sdn Bhd 
650 0 |a Computer security 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer software  |x development 
700 1 |a Greene, Adam 
700 1 |a Amini, Pedram 
999 |a vtls000049797  |c 49166  |d 49166