Network fuzzing – mutation fuzzing with Taof proxying
So far, this book has been exploring attacking perspectives that can be applied in the field. Fuzzing, on the other hand, is not an attack in the usual sense of the word. It's a testing methodology; for example, QA engineers fuzz user interfaces all the time. So, when do we leverage fuzzing as pen testers? As an example, suppose you've just completed some reconnaissance against your client's systems. You find a service exposed to the internet and discover that it reveals its full version information in a banner grab. You would not want to start fuzzing this service on the production network, but, you could get your hands on a copy and install it in your lab using the information you have acquired from the target. We're going to take a look at some network fuzzing that you just might end up doing in your hotel room after your first couple days with your client.
As the name implies, mutation fuzzing takes a given set of data and mutates...