https://tigerbeetle.com/blog/2025-11-28-tale-of-four-fuzzers/ #worldtour #bytejuggling #cybersecurity #techhumor #travelingcircus #HackerNews #ngated
How do we avoid making the same ten implementation mistakes again and again?
...cynically, we don't. This is why I'm still employed as a web application tester; the OWASP Top Ten still bite hard.
Less cynically, we do it by knowing that there are only so many kinds of fraud to perpetrate, and looking for places those can be made to work on an existing system.
We know patterns and we apply them with all the creativity the human mind can muster.
That means, to be thorough, we have to remember and look for as many as possible. Yes, this is a difficult cognitive task.
It is also not one a machine can perform. It builds on context and adds history, creativity, and the endless drive to find just one more way in.
I already have #fuzzers and regex-generation tools. Those, frankly, will not be improved by adding the massive processor load LLMs require.
What I do need is time, context, and knowledge, to create an attack that will work.
Whenever explaining my research, I always inevitably get asked "What is a Fuzzer", so I wrote a blog about it:
What is a Fuzzer?
https://www.lremes.com/posts/fuzzing/
Fuzzing readelf on a 48 core machine with my #distributed fuzzer Hopper:
https://github.com/Cybergenik/hopper
I have 4 more of these doing the same thing, lets see if I find something interesting.
#cloudlab #fuzzers #gnu
Some #fuzzers we like to use in our security engagements include:
- LibFuzzer
- American Fuzzy Lop (AFL)
- honggfuzz
- boofuzz
See our full list for your #fuzzing needs! https://bishopfox.com/blog/top-9-fuzzers