@matalaz @Dave_Maynor Or don't write a fuzzer and manually poke and find 10 :D
-
-
-
@dlitchfield@Dave_Maynor depends on how audited is it, but I agree. - Još 3 druga odgovora
Novi razgovor -
-
-
@MarioVilas@dlitchfield@Dave_Maynor what I usually do is the following: 1) Fuzz 2) While fuzzing audit manually 3) Adapt fuzzers. Goto #2.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
@matalaz@Shiftreduce "...and then my symbolic exec tool found a high-sev vuln in a crazy code path that the dumbass fuzzer missed." :) -
@depletionmode@Shiftreduce But, I agree that such tools can find awesome vulns.
Kraj razgovora
Novi razgovor -
-
-
@matalaz@daviottenheimer That guy looks like a typical academic researcher. Not crying, cause it's accepted to CCS/SP ;-) - Kraj razgovora
Novi razgovor -
-
-
what was the name of this comic strip again? i forgot
-
infosuck was the series, IIRC.
- Još 1 odgovor
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.