Description: Demonstrates clientside fuzzing method using tcpjunk.
http://code.google.com/p/tcpjunk
This is how I found a bug in SPlayer prior to writing an exploit for it and releasing a poc.
References:
http://www.exploit-db.com/exploits/17243
http://www.exploit-db.com/exploits/17268/
http://www.metasploit.com/modules/exploit/windows/misc/splayer_content_type
http://www.osvdb.org/72181
http://secunia.com/advisories/44431
Tags: fuzzing , fuzzer , tcpjunk , client , client-side , finding bugs , howto , software , applications , demonstration , buffer , overflow , technique , exploit , xsploitedsec , securitytube ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
thanck you
nice video. i think in a lot of cases, this type of video is vastly underrated. good job.
Thanks. I will try to upload and contribute as much as I can.