Главная
Study mode:
on
1
Intro
2
What we do
3
Product Security Assessment
4
What Kind of Bugs
5
Traditional Fuzzing
6
Fuzzing Tools
7
Constraint Solver
8
Web Scanning
9
MS RD
10
MS RD Demo
11
Working Github
12
MS RD Partner
13
Questions
14
Confidentiality
Description:
Explore advanced fuzzing techniques and tools for identifying and fixing memory corruption vulnerabilities in a comprehensive conference talk from Derbycon 2019. Learn about product security assessment, traditional fuzzing methods, and cutting-edge fuzzing tools incorporating constraint solvers. Gain insights into web scanning techniques and witness a live demonstration of Microsoft's Remote Desktop Protocol (RDP) vulnerability. Discover practical approaches to writing memory corruption exploits and enhancing software security through hands-on examples and expert guidance.

Using Next Generation Fuzzing Tools - Fixing Bugs and Writing Memory Corruption Exploits

Add to list