From cbf88e3ee84c99b99e16040aa0c7a5997fe7a586 Mon Sep 17 00:00:00 2001 From: caprinux <123jinkai@gmail.com> Date: Sat, 18 Nov 2023 17:45:11 +0800 Subject: [PATCH] nitpick fix formatting issues --- content/posts/secweds/ay2324s1/sw1511.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/content/posts/secweds/ay2324s1/sw1511.md b/content/posts/secweds/ay2324s1/sw1511.md index 27e3276..c81f9eb 100644 --- a/content/posts/secweds/ay2324s1/sw1511.md +++ b/content/posts/secweds/ay2324s1/sw1511.md @@ -14,12 +14,12 @@ secweds: True --- -**Talk Title: Practical Application of Fuzzing -- Finding CVE-2021-3376 - -#### Description +**Talk Title: Practical Application of Fuzzing -- Finding CVE-2021-3376** [Download Slides](/secwed-slides/ay2324s1/practical%20application%20of%20fuzzing.pdf) +#### Description + Yi Tian is a current member of NUS Greyhats, and a former intern of Star Labs. During his internship with Star Labs, he wrote fuzzers and harnesses and found an information disclosure vulnerability in Windows Media Foundation, CVE-2021-33760. Fuzzing is often misunderstood and through this presentation, we hope to enlighten you on just what goes into building a harness and running a fuzzer. We'll also take a quick look at a real-world CVE discovered using a fuzzer, shedding light on the practical application of fuzzers. ---