Fuzzing Closed Source Applications
Offered By: DefCamp via YouTube
Course Description
Overview
Explore the intricacies of fuzzing closed source applications in this 46-minute conference talk from DefCamp 2017. Delve into advanced techniques for identifying vulnerabilities and improving security in proprietary software. Learn from industry experts as they share insights on overcoming challenges associated with testing closed source systems. Gain valuable knowledge on implementing effective fuzzing strategies, understanding potential attack vectors, and enhancing overall application security. Discover how to adapt and apply these methods to your own projects, whether you're a security professional, developer, or enthusiast interested in strengthening closed source software defenses.
Syllabus
DefCamp 2017 - Fuzzing closed source applications
Taught by
DefCamp
Related Courses
The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022DefCamp via YouTube The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube