Fuzzing brute force vulnerability discovery
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , |
| Format: | Book |
| Language: | English |
| Published: |
Upper Saddle River, NJ
Addison-Wesley
207
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 49166 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219005635.0 | ||
| 008 | 130723 2007 njua i 000 0 eng d | ||
| 020 | |a 9780321446114 | ||
| 020 | |a 0321446119 | ||
| 039 | 9 | |a 201312031250 |b zul |c 201312031247 |d zul |c 201307230912 |d azraai |y 201307230911 |z azraai | |
| 040 | |a UPNM | ||
| 090 | |a QA 76.9.A25 |b S88 2007 | ||
| 100 | 1 | |a Sutton, Michael | |
| 245 | 1 | 0 | |a Fuzzing |b brute force vulnerability discovery |c Michael Sutton, Adam Greene, Pedram Amini |
| 260 | |a Upper Saddle River, NJ |b Addison-Wesley |c 207 | ||
| 300 | |a xxvii, 543 p. |b ill. |c 23 cm. | ||
| 500 | |a Includes index | ||
| 505 | |a Foreword xix Preface xxi Acknowledgments xxv About the Author xxvii P ARTI B ACKGROUND 1 Chapter 1 Vulnerability Discovery Methodologies 3 Chapter 2 What Is Fuzzing? 21 Chapter 3 Fuzzing Methods and Fuzzer Types 33 Chapter 4 Data Representation and Analysis 45 Chapter 5 Requirements for Effective Fuzzing 61 P ART II T ARGETS AND A UTOMATION 71 Chapter 6 Automation and Data Generation 73 Chapter 7 Environment Variable and Argument Fuzzing 89 Chapter 8 Environment Variable and Argument Fuzzing: Automation 103 Chapter 9 Web Application and Server Fuzzing 113 Chapter 10 Web Application and Server Fuzzing: Automation 137 Chapter 11 File Format Fuzzing 169 Chapter 12 File Format Fuzzing: Automation on UNIX 181 Chapter 13 File Format Fuzzing: Automation on Windows 197 Chapter 14 Network Protocol Fuzzing 223 Chapter 15 Network Protocol Fuzzing: Automation on UNIX 235 Chapter 16 Network Protocol Fuzzing: Automation on Windows 249 Chapter 17 Web Browser Fuzzing 267 Chapter 18 Web Browser Fuzzing: Automation 283 Chapter 19 In-Memory Fuzzing 301 Chapter 20 In-Memory Fuzzing: Automation 315 P ART III A DVANCED F UZZING T ECHNOLOGIES 349 Chapter 21 Fuzzing Frameworks 351 Chapter 22 Automated Protocol Dissection 419 Chapter 23 Fuzzer Tracking 437 Chapter 24 Intelligent Fault Detection 471 P ART IV L OOKING F ORWARD 495 Chapter 25 Lessons Learned 497 Chapter 26 Looking Forward 507 Index 519 | ||
| 592 | |b 18/6/13 |c Hadiah & Sumbangan |h Darul Risalah Sdn Bhd | ||
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Computer software |x development | |
| 700 | 1 | |a Greene, Adam | |
| 700 | 1 | |a Amini, Pedram | |
| 999 | |a vtls000049797 |c 49166 |d 49166 | ||


