Back to the Fuzz: Fuzzing for Command Injections

Back to the Fuzz: Fuzzing for Command Injections

|
Some may remember NCSA HTTPd, a predecessor to Apache. However, what they might not know (but won't be surprised by!) is that it had plenty of bugs. Let's dive in and reproduce a classic command injection with fuzzing! ... Read More
Back to the Fuzz: Fuzzing for Command Injections

Back to the Fuzz: Fuzzing for Command Injections

|
Some may remember NCSA HTTPd, a predecessor to Apache. However, what they might not know (but won't be surprised by!) is that it had plenty of bugs. Let's dive in and reproduce a classic command injection with fuzzing! ... Read More
Screen Shot 2020-11-23 at 11.14.47 AM.png

Six-Library Vulnerability in NGA

|
Imagine if all of the sudden satellites across the world stopped working. Services that we take for granted such as navigation, satellite imagery, weather, and even time-keeping would become unavailable seemingly without explanation. This software contained a code execution bug discovered by ForAllSecure Mayhem ... Read More
Six-Library Vulnerability in NGA

Six-Library Vulnerability in NGA

|
Imagine if all of the sudden satellites across the world stopped working. Services that we take for granted such as navigation, satellite imagery, weather, and even time-keeping would become unavailable seemingly without explanation. This software contained a code execution bug discovered by ForAllSecure Mayhem ... Read More
sub_408f78.png

Firmware Fuzzing 101

|
Introduction Embedded applications are some of the most prolific software out there in the world. Whether it be routers, IoT devices or SCADA systems, they are very varied in architecture, use case, and purpose. Very few of these devices have security in mind when they were built. And even fewer ... Read More
Firmware Fuzzing 101

Firmware Fuzzing 101

|
Introduction Embedded applications are some of the most prolific software out there in the world. Whether it be routers, IoT devices or SCADA systems, they are very varied in architecture, use case, and purpose. Very few of these devices have security in mind when they were built. And even fewer ... Read More