This test opens a VPN connection to the target network and afterwards checks for buffer overflow, remote format string, input validation, integer over flow and, integer sign conditions. This is done by running a several fuzzing attacks against the target.
It is required that all services on tested system are running on their standard port.
The following protocols are supported:
Public Member Functions
|This function is called by the __init__ function from the parent. |
|implementation of fuzzing |