Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hourglass Fuzz - A Quick Bug Hunting Method

Hack In The Box Security Conference via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course teaches a bug hunting method called Hourglass Fuzz, specifically designed for the Android operating system. The learning outcomes include understanding the limitations of typical fuzzing methods, learning the philosophy behind Hourglass Fuzz, and discovering vulnerabilities in graphic drivers and Bluetooth systems. The course covers user space fuzzing, attack interfaces, kernel space fuzzing, fuzzing strategies, and best practices. The intended audience for this course is security researchers interested in expanding their fuzzing techniques and enhancing their bug hunting capabilities.

Syllabus

Intro
Pain point
Hourglass Fuzzing Philosophy
User Space Fuzzing
Attack Interface --- selection
Bluetooth - Architecture in brief
Bluetooth -- Module View
Bluetooth -- Source Tree
Bluetooth -- Architecture in detail
Bluetooth -- Startup work flow
Bluetooth ----Packet Structure & Common Dispatcher
Bluetooth --- Target functions
Sanitizer Support
Fuzzer Overview
Fuzzing Strategy
Best Practice
Kernel Space Fuzzing
Introduction
How to achieve passive fuzz
How to transfer the filter list
Fuzzing strategies
What do we need to prepare
Build kernel issues
KGSL in detail
Solution Overview
Panic call stack
How to make it automatic
Fuzz status statistics
Install and run different kinds of 3D games
add a for loop
Add a trigger program
Case 1

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Hourglass Fuzz - A Quick Bug Hunting Method

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.