T
T
TyLo2018-07-19 02:44:39
Computer networks
TyLo, 2018-07-19 02:44:39

How to test protocols for vulnerabilities?

There is a task - to test the data transfer protocol. How do they test protocols in general, how do they look for vulnerabilities?
There is evidence that AES-256, RSA are used for encryption

Answer the question

In order to leave comments, you need to log in

2 answer(s)
A
athacker, 2018-07-19
@athacker

Read about fuzzing, for example: https://en.wikipedia.org/wiki/Fuzzing

G
Griboks, 2018-07-19
@Griboks

Typically, protocols are verified and then modeled.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question