Hackers of India

Vulnerability research anyone?

 Omair 

2013/03/01

Abstract

This talk covers the sweat and blood that goes into building and managing an infrastructure for fuzzing. Not forgetting on how to write a fuzzer which finds you bugs…security bugs…exploitable bugs! but also monitoring and classifying these bugs. Since controlling EIP is probably the easiest of the things, this talk covers the rest of the challenges.