Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced fuzzing techniques and tools for identifying and fixing memory corruption vulnerabilities in a comprehensive conference talk from Derbycon 2019. Learn about product security assessment, traditional fuzzing methods, and cutting-edge fuzzing tools incorporating constraint solvers. Gain insights into web scanning techniques and witness a live demonstration of Microsoft's Remote Desktop Protocol (RDP) vulnerability. Discover practical approaches to writing memory corruption exploits and enhancing software security through hands-on examples and expert guidance.