Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What is the use of the cache overflow vulnerability tool Doona

2025-01-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

This article mainly introduces the cache area overflow vulnerability tool Doona what is useful, has a certain reference value, interested friends can refer to, I hope you can learn a lot after reading this article, the following let the editor with you to understand.

Cache overflow vulnerability tool Doona

Doona is an offshoot of the cache overflow vulnerability tool BED. It adds more plug-ins on the basis of BED, such as nttp, proxy, rtsp, tftp and so on. At the same time, it expands the attack load for each plug-in, also known as fuzzy use case (fuzz case), which can more thoroughly detect the possible cache overflow vulnerabilities of the target.

When testing each attack payload, you have to test it several times, each in a different form. Due to the increase of the load, the testing time will be longer. In order to submit test efficiency, Doona allows penetration testers to use the-M option to limit the number of tests per load to identify vulnerabilities as soon as possible. If a vulnerability is found, you can use the-r option to continue with the rest of the testing.

Thank you for reading this article carefully. I hope the article "what is the use of cache overflow vulnerability tool Doona" shared by the editor will be helpful to you. At the same time, I also hope that you will support us and pay attention to the industry information channel. More related knowledge is waiting for you to learn!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report