Learn how agent instrumentation improves fuzz testing of automotive IVI and telematics systems, and about financial services application security.
Do you have questions about fuzz testing? We’ve got answers, explanations, and recommendations from our last webinar on fuzzing using agent instrumentation.
We discovered a WPA2 encryption bypass vulnerability (CVE-2018-18907) in a router that allows full access to a WLAN without credentials. The vendor has released a patch for the device.
Posted in Fuzz Testing | Comments Off on WPA2 encryption bypass: Using Defensics to uncover behavioral vulnerabilities
This is the second of two articles that describe how to use the Defensics SDK in fuzzing Bitcoin. In the previous article, you saw how to set up a test bed for bitcoind. We created two containers, alice and bob, and were able to set up communication between the two bitcoind instances. In this article, you’ll learn how to create a data model for the Bitcoin network protocol, then use this model in the Defensics SDK to perform fuzzing on bitcoind.
This is the first of two articles that describe how to use the Defensics SDK to fuzz Bitcoin software. Specifically, you will learn how to model one of the Bitcoin protocol messages and use the Defensics SDK to perform fuzzing on the bitcoind process.
Posted in Fuzz Testing | Comments Off on Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network
How do you find vulnerabilities and issues in Bluetooth-enabled devices? One of our favorite methods is fuzzing. Learn how to fuzz test Bluetooth car kits.
Written in coordination with Chris Clark, Defensics product manager
Posted in Fuzz Testing | Comments Off on Debunking the top 5 Defensics fuzz testing myths
The definition of responsible vulnerability disclosure varies based on who you ask. Tech goliath Microsoft has openly disagreed with Google on this very topic, as outlined by The Verge.
Ensure that your business-critical software is resilient enough to withstand DDoS attacks and that your IoT devices’ attack surfaces are hardened.
Posted in Fuzz Testing | Comments Off on How to proactively protect IoT devices from DDoS attacks
As of Sept. 12, 2017, much of the code vulnerable to BlueBorne Bluetooth attacks remains unpatched. Learn what you can do to secure your code.