Book

Fuzzing Against the Machine

Fuzzing Against the Machine will help security practitioners to deal with the explosion of IoT devices and the amount of code to analyze. This hands-on guide is filled with examples and use cases that’ll enable you to discover the flaws in any system before a breach occurs.

Offered byPackt Logo

Difficulty Level

Intermediate

Completion Time

7h56m

Language

English

About Book

Who Is This Book For?

This book is for security researchers, security professionals, embedded firmware engineers, and embedded software professionals. Learners interested in emulation, as well as software engineers interested in vulnerability research and exploitation, software testing, and embedded software development will also find it useful. The book assumes basic knowledge of programming (C and Python); operating systems (Linux and macOS); and the use of Linux shell, compilation, and debugging.

Book content

chapters 7h56m total length

Who this book is for

History of emulation

Qemu from the ground

Qemu Execution Modes and Fuzzing

A Famous Refrain: AFL+QEMU = CVEs

Modifying QEMU for basic instrumentation

Real-life Case Study: Samsung Exynos Baseband

Case Study: OpenWRT full system fuzzing

Case Study: OpenWRT System Fuzzing for ARM

Finally Here: iOS Full System Fuzzing

Deus Ex Machina: Fuzzing Android Libraries

Conclusion and Final Remarks

Related Resources

Access Ready-to-Use Books for Free!

Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!

No credit card required