Fuzzing is a technique in software testing where you generate a number of random inputs, and see how a program handles it. So what does a testing technique have to do with a process such as the Cyber Kill Chain as developed by Lockheed Martin? Easy! Just as fuzzing a software produces resilient software, fuzzing a process will produce a validated process. The Kill Chain takes about seven steps that adversaries must complete in order to achieve their goals, but will it always be the case? Can an attacker pull off a successful attack with just one step? Or three? That’s what we’re going to fuzz out …
(Again, in order to avoid cross-posting between the different blogs, that was just a brief paragraph and a link to the original post is below).
Continue reading: https://www.safebreach.com/blog/fuzzing-the-kill-chain
*** This is a Security Bloggers Network syndicated blog from I hack, therefore I am authored by Itzik Kotler. Read the original post at: http://feedproxy.google.com/~r/ikotler/~3/Ew6ZHT7-fHE/fuzzing-kill-chain.html