Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Fuzzing libexif - Hands-on Security Vulnerability Testing

OpenSecurityTraining2 via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to fuzz the libexif library in this 11-minute hands-on tutorial that demonstrates practical fuzzing techniques for finding security vulnerabilities in image processing software. Apply mutation-based, generation-based, and coverage-guided fuzzing approaches specifically to libexif, a library commonly used for reading and writing EXIF metadata in image files. Follow along with AFL-driven workflows to discover potential crashes and unexpected behavior in this real-world target. Practice setting up fuzzing environments, running effective fuzz campaigns against libexif functions, and interpreting crash results to identify security issues. Gain experience with instrumentation techniques and sanitizers including ASAN, PCGUARD, and LTO builds while targeting this widely-used image metadata library. Master the practical skills needed to conduct thorough security testing of libraries that handle untrusted input data, preparing you to identify and report vulnerabilities in similar software components.

Syllabus

Fuzz1001 05 02 libexif

Taught by

OpenSecurityTraining2

Reviews

Start your review of Fuzzing libexif - Hands-on Security Vulnerability Testing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.