Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Finding Zero-Day Vulnerabilities in Web Applications with Coverage-Guided Fuzzing - PHUZZ Framework

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore coverage-guided fuzzing for PHP web applications in this one-hour conference talk from the 38th Chaos Communication Congress (38C3). Learn about PHUZZ, an academic fuzzing framework that outperforms traditional black-box vulnerability scanners in detecting web vulnerabilities. Discover how coverage-guided fuzzing, traditionally used for finding memory corruption bugs in binary applications, can be effectively applied to web application security testing. Understand the technical challenges of implementing coverage-guided fuzzing for web applications and see how PHUZZ successfully detects various vulnerability classes including SQLi, RCE, XSS, XXE, open redirection, insecure deserialization, and path traversal. Follow along as the framework's capabilities are demonstrated through real-world examples, including the discovery of over 20 potential security issues and two 0-day vulnerabilities in popular WordPress plugins. Gain insights into automated vulnerability discovery methods that offer a more cost-effective alternative to traditional security testing approaches like penetration testing and source code reviews.

Syllabus

38C3 - What the PHUZZ?! Finding 0-days in Web Applications with Coverage-guided Fuzzing

Taught by

media.ccc.de

Reviews

Start your review of Finding Zero-Day Vulnerabilities in Web Applications with Coverage-Guided Fuzzing - PHUZZ Framework

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.