Presented at
REcon 2006,
June 16, 2006, 11:30 a.m.
(60 minutes).
This presentation will introduce fuzzing and discuss how it can be applied to different classes of vulnerabilities. We will begin by looking at fuzzing from an academic perspective. Most importantly, newly developed open source tools will be demonstrated and released publicly. Two primary audiences will be attracted to this presentation; those wishing to discover vulnerabilities through fuzzing and those who wish to protect against them.
Presenters:
-
Michael Sutton
Prior to joining iDefense/VeriSign, Michael established the Information Systems Assurance and Advisory Services (ISAAS) practice for Ernst & Young in Bermuda. He is a frequent presenter at information security conferences.
He has completed a Master of Science in Information Systems Technology degree at George Washington University, has a Bachelor of Commerce degree from the University of Alberta and is a Chartered Accountant. Outside of the office, he is a Sergeant with the Fairfax Volunteer Fire Department.developed open source tools will be demonstrated and released publicly. Two primary audiences will be attracted to this presentation; those wishing to discover vulnerabilities through fuzzing and those who wish to protect against them.
Links:
Similar Presentations: