Exploit Development, Part 3: Finding Vulnerabilities by Fuzzing with Spike

Sept. 27, 2017 via hackers-arise.com

Often, as part of the exploit development process, we will want to test an application for vulnerabilities, especially buffer overflows. One of the ways we can do that is to send random, varying length, invalid data at the application and see what happens. If we can get the application to crash, this often is a sign of a vulnerability that we can then develop an exploit for later.


negrii_irina88 3 weeks, 1 day ago

speaking about buffer overflows..writing outside the bounds of a block of allocated memory can corrupt data, crash the program, or cause the execution of malicious code.