I was reading
(link via Hacker News)
about fuzz testing a DNS server and when I saw that the problematic packets that caused the program to crash
could be downloaded,
I figured I would give them a try against my own DNS parsing code.
My code did not crash,
which is what I expected given that some of the tests I did included throwing random data.
But I might have to install
afl-fuzz and play around with it.
I'd really love to throw
afl-fuzz at the Protocol Stack From Hell™,
and while it would be cathartic,
in a way,
that's like shooting already dead fish in a wine barrel with a double barrel shot-gun at point-blank range.
Obligatory Contact Info
You have my permission to link freely to any entry here. Go
ahead, I won't bite. I promise.
The dates are the permanent links to that day's entries (or
entry, if there is only one entry). The titles are the permanent
links to that entry only. The format for the links are
simple: Start with the base link for this site: https://boston.conman.org/, then add the date you are
interested in, say 2000/08/01,
so that would make the final URL:
You can also specify the entire month by leaving off the day
portion. You can even select an arbitrary portion of time.
You may also note subtle shading of the links and that's
intentional: the “closer” the link is (relative to the
page) the “brighter” it appears. It's an experiment in
using color shading to denote the distance a link is from here. If
you don't notice it, don't worry; it's not all that
It is assumed that every brand name, slogan, corporate name,
symbol, design element, et cetera mentioned in these pages is a
protected and/or trademarked entity, the sole property of its
owner(s), and acknowledgement of this status is implied.