Fuzzing

Results: 86



#Item
51 BLACKHAT BRIEFINGS 2005 The Art of SIP fuzzing and Vulnerabilities Found in VoIP Ejovi Nuwere – Mikko Varpiola

 BLACKHAT BRIEFINGS 2005 The Art of SIP fuzzing and Vulnerabilities Found in VoIP Ejovi Nuwere – Mikko Varpiola

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
52The Art of File Format Fuzzing In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself

The Art of File Format Fuzzing In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
53Fuzzing Vicente Díaz Edge-Security www.edge-security.com FIST Conferences www.fistconference.org

Fuzzing Vicente Díaz Edge-Security www.edge-security.com FIST Conferences www.fistconference.org

Add to Reading List

Source URL: www.edge-security.com

Language: Spanish - Date: 2006-03-05 14:32:29
    54BLACKHAT BRIEFINGS 2005 The Art of SIP fuzzing and Vulnerabilities Found in VoIP By Ejovi Nuwere & Mikko Varpiola

    BLACKHAT BRIEFINGS 2005 The Art of SIP fuzzing and Vulnerabilities Found in VoIP By Ejovi Nuwere & Mikko Varpiola

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:31
    55Fuzzing Daniel Bas´aez S.   January 22, 2009

    Fuzzing Daniel Bas´aez S. January 22, 2009

    Add to Reading List

    Source URL: www.verifysoft.com

    Language: English - Date: 2011-01-03 03:00:55
    56Fuzzing Frameworks Pedram Amini <> Introduction There are a number of available specialized fuzzing utilities which target many common and documented network protocols and file formats. These fuzzers ex

    Fuzzing Frameworks Pedram Amini <> Introduction There are a number of available specialized fuzzing utilities which target many common and documented network protocols and file formats. These fuzzers ex

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    57Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared D. DeMott Computer Science Michigan State University

    Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared D. DeMott Computer Science Michigan State University

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    58Fuzzing Win32 Interprocess Communication Mechanisms Jesse Burns, Principal Partner, iSEC Partners Prepared For: Black Hat 2006, Las Vegas, NV

    Fuzzing Win32 Interprocess Communication Mechanisms Jesse Burns, Principal Partner, iSEC Partners Prepared For: Black Hat 2006, Las Vegas, NV

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:36
    59Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared DeMott Dr. Richard Enbody @msu.edu Dr. William Punch

    Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared DeMott Dr. Richard Enbody @msu.edu Dr. William Punch

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    60In Memory Fuzzing Real Time Input Tracing and In Memory Fuzzing by sinn3r – twitter.com/_sinn3r 2010  Introduction

    In Memory Fuzzing Real Time Input Tracing and In Memory Fuzzing by sinn3r – twitter.com/_sinn3r 2010 Introduction

    Add to Reading List

    Source URL: chzv.net

    Language: English - Date: 2010-10-23 03:10:15