Black box and fuzzing
In this book, we will focus on how to protect our network and network devices. In this regard, we will see how to use fuzz testing or fuzzing, a testing technique that inputs data into the device under attack, expecting one of the following results:
- Breaking into the system under attack
- Getting secure information from the device under attack
- Crashing the system under attack
Although the classical use of fuzzing tools is for software testing, in this chapter we will see a special aspect of it, in which we use it for breaking into, crashing, and manipulating communication devices.
Another important issue is that, unlike servers, communication equipment connects networks and Virtual Local Area Networks (VLANs) and therefore usually has several interfaces that are connected to several VLANs and/or to several networks. Risks can come from each one of them, so the test should be performed from different locations on different physical ports...