Fuzzing Against the Machine
Fuzzing Against the Machine will help security practitioners to deal with the explosion of IoT devices and the amount of code to analyze. This hands-on guide is filled with examples and use cases that’ll enable you to discover the flaws in any system before a breach occurs.
Offered by
Difficulty Level
Intermediate
Completion Time
7h56m
Language
English
About Book
Who Is This Book For?
This book is for security researchers, security professionals, embedded firmware engineers, and embedded software professionals. Learners interested in emulation, as well as software engineers interested in vulnerability research and exploitation, software testing, and embedded software development will also find it useful. The book assumes basic knowledge of programming (C and Python); operating systems (Linux and macOS); and the use of Linux shell, compilation, and debugging.
Fuzzing Against the Machine
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 7h56m total length
Who this book is for
History of emulation
Qemu from the ground
Qemu Execution Modes and Fuzzing
A Famous Refrain: AFL+QEMU = CVEs
Modifying QEMU for basic instrumentation
Real-life Case Study: Samsung Exynos Baseband
Case Study: OpenWRT full system fuzzing
Case Study: OpenWRT System Fuzzing for ARM
Finally Here: iOS Full System Fuzzing
Deus Ex Machina: Fuzzing Android Libraries
Conclusion and Final Remarks
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!