Overview
Learn how to create and implement fuzzers for vulnerability discovery in this 42-minute conference talk from CarolinaCon. Explore different types of fuzzers and potential targets while gaining practical knowledge about identifying buffer overflow vulnerabilities and developing custom exploits. Watch live demonstrations of two proof-of-concept examples that illustrate the practical application of fuzzing techniques in cybersecurity testing and exploitation.
Syllabus
Fuzzing: Finding Your Own Bugs and 0days! by Rodolpho Concurde (ROd0X)
Taught by
CarolinaCon