A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


Fuzzing with AFL - Adam DC949 (Circle City Con 2017 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)

Fuzzing with AFL
Adam DC949

Circle City Con 2017

Fuzzing is easy to learn, but hard to master. This will give you an overview of the fuzzer which have become the gold standard of fuzzing, lcamtuf's American Fuzzy Lop (AFL). We'll go over the logic of mutation based fuzzing, how the feedback loop works, different mutation strategies, and different execution paths are found. Then we'll go over practical usage of AFL, and finally talk about the limitations of AFL and how people are working around them.

Adam is one of the founders of DC949 and has been hacking on things for over a decade. Previous shenanigans include but are not limited to: breaking reCAPTCHA with an accuracy of 99.1%, turning Twitter into a filesystem, and co-founding Open Capture The Flag (OCTF) at DEF CON. As a day job, he finds 0-days. His favorite kind of vulnerabilities are the design flaws. Why? Because one does not simply release a patch for a design flaw!


Back to Circle City Con 2017 Videos list

Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast