📥 Download source code and materials: https://academy.fuzzinglabs.com/introduction-browser-fuzzing?coupon=YOUTUBE
This video is a replay of my latest workshop about V8 fuzzing using Dharma.
In this short hands-on workshop, we will attack the V8 JavaScript Engine using grammar-based fuzzing. First, I will show how to download a version of V8 already compiled with addressSanitizer (ASAN). Then, I will introduce how to write a Dharma grammar and finally, we will use some simple scripts to start automation. Most of what you will learn during this workshop can be applied in other JavaScript engines like SpiderMonkey, JavaScriptCore, etc.
#Fuzzing #V8 #javascript
links:
- https://www.ringzer0.training/browser-fuzzing.html
- https://academy.fuzzinglabs.com/introduction-browser-fuzzing?coupon=YOUTUBE
- https://fuzzinglabs.com/practical-web-browser-fuzzing/
==== 💻 FuzzingLabs Training ====
- Practical Web Browser Fuzzing: https://fuzzinglabs.com/practical-web-browser-fuzzing/
- C/C++ Whitebox Fuzzing: https://academy.fuzzinglabs.com/c-whitebox-fuzzing?coupon=youtube
- Rust Security Audit and Fuzzing: https://academy.fuzzinglabs.com/rust-security-audit-and-fuzzing-training?coupon=youtube
- WebAssembly Reversing and Dynamic Analysis: https://academy.fuzzinglabs.com/wasm-security-reversing-dynamic-analysis?coupon=youtube
- Go Security Audit and Fuzzing: https://academy.fuzzinglabs.com/go-security-audit-and-fuzzing?coupon=youtube
==== 🦄 Join the community ====
https://academy.fuzzinglabs.com/fuzzing-labs-community
==== 📡 Socials ====
- Twitter: https://twitter.com/FuzzingLabs
- Telegram: https://t.me/fuzzinglabs
Keywords: Fuzzing, Fuzz Testing, Blackbox fuzzing, Dharma, Chrome, V8, D8, ASAN, AddressSanitizer, Grammar-based Fuzzing
Link to this video: https://youtu.be/MLz86hFyGwY