How to build a serial port fuzzer with Defensics SDK
Defensics SDK makes fuzz testing possible for custom protocols. Learn how to create a custom injector using the Defensics SDK API.
Posted in Fuzz Testing
Defensics SDK makes fuzz testing possible for custom protocols. Learn how to create a custom injector using the Defensics SDK API.
Posted in Fuzz Testing
In part two of this series, learn how to create a data model for the Bitcoin network protocol and use the Defensics SDK to perform fuzzing on bitcoind.
Posted in Developer Enablement, Fuzz Testing
This is the first part of a two-part advanced technical tutorial that describes how you can use the Defensics SDK to set up your own Bitcoin network.
Posted in Fuzz Testing
Three WPA authentication bypass vulnerabilities were found in wireless routers using the Defensics fuzz testing tool.
Posted in Fuzz Testing, Software Security Research
In our webinar, we talked about preparing for zero-day attacks using fuzz testing, as well as Defensics system compatibility, fuzzing techniques, and more.
Posted in Fuzz Testing, Webinars
With the Defensics SDK, you can create fuzzing test suites for any type of data. In this article, we demonstrate how to start modeling a custom protocol.
Posted in Fuzz Testing
By helping your fuzzer detect failure better with agent instrumentation, you can maximize the value of fuzz testing in your secure development life cycle.
Posted in Fuzz Testing
Learn more about fuzzing instrumentation techniques, ranging from simple black box approaches to deeper types that can detect subtler failure modes.
Posted in Fuzz Testing, Webinars
Learn about the ins and outs of fuzzing, how to secure your DevOps pipeline with Synopsys and Red Hat, and what ISO/SAE 21434 means for automotive security.
Posted in Agile, CI/CD & DevOps, Automotive Cyber Security, Fuzz Testing, Webinars
The most efficient fuzzing happens not with random test cases but with targeted test cases generated from detailed data models and a powerful anomalizer.
Posted in Fuzz Testing