Completed
SPEAKER BIO
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Exposing Hidden Exploitable Behaviors Using EDF
Automatically move to the next video in the Classroom when playback concludes
- 1 SPEAKER BIO
- 2 1.3. How: Fuzzing Process
- 3 1.3. How: The Input
- 4 1.3. How: The Software
- 5 1.4. Why? To automatize the output analysis
- 6 Common Fuzzing: Crashes
- 7 2. Crashes: XDIFF Output - Valgrind
- 8 2. Crashes: XDIFF Output - Return Codes
- 9 2. Crashes: XDIFF Output - Hangs
- 10 What is Differential Fuzzing?
- 11 What to Execute
- 12 3.1. Different Implementations: Stdout
- 13 3.2. Different Inputs: Stdout
- 14 3.3. Different Versions: Stdout
- 15 What to Detect
- 16 4.1. Path Disclosure: XDIFF Output
- 17 4.1. Path Disclosure: Powershell (cont'd)
- 18 4.3. Error Disclosure: XDiFF Output
- 19 4.4. Code Evaluated: XDIFF Output
- 20 4.5. Command Execution: XDIFF Output
- 21 4.6. Network Connection: XDiFF Output
- 22 4.6. Network Connection: JRuby RCE
- 23 4.7. File Read: Leak Root's Password