Skip to content

Commit

Permalink
Add Stefan's GrrCon 2019 talk about symbolically executing a fuzz tar…
Browse files Browse the repository at this point in the history
…get.
  • Loading branch information
mike-myers-tob committed Nov 22, 2019
1 parent f930379 commit a689460
Show file tree
Hide file tree
Showing 2 changed files with 15 additions and 0 deletions.
15 changes: 15 additions & 0 deletions presentations/Symbolically Executing a Fuzzy Tyrant/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
Symbolically Executing a Fuzzy Tyrant
====================================

Code reviewers and penetration testers are familiar with the normal dynamic and static application security tools (DAST|SAST). These tools can provide varying levels of coverage with varying levels of false/true positives. However, there are other classes of tools that can provide deeper understanding and more vulnerabilities in the same amount of time as traditional tools. This talk covers two such classes: (smart) fuzzers and symbolic execution. As a practicum, it is focused on every-day scenarios that normal security analysts face, rather than theoretical attacks in an academic setting. The author’s current setup is provided as an example.

Presented at

* [GrrCon 2019](http://grrcon.com/schedule/)

Resources

* Slides: [Symbolically Executing a Fuzzy Tyrant](symbolically_executing_a_fuzzy_tyrant.pdf)

Authors
* Stefan Edwards
Binary file not shown.

0 comments on commit a689460

Please sign in to comment.