TestIntegerOverflowVpn Class Reference
[Available test cases]
List of all members.
Scenario: Integer overflow and integer sign attack.
This test opens a VPN connection to the target network and afterwards checks for buffer overflow, remote format string, input validation, integer over flow and, integer sign conditions. This is done by running a several fuzzing attacks against the target.
It is required that all services on tested system are running on their standard port.
The following protocols are supported:
- DNS (port 53)
- H2250 (port 1720)
- HTTP (port 80)
- ISAKMP (port 500)
- LDAP (port 389)
- SIP (port 5060)
- SNMP (port 161, 162)
- WAP WMLC (port 80)
- WAP WSP (port 9200, 9201)
Definition at line 28 of file TestIntegerOverflowVpn.py.
Public Member Functions
| ||This function is called by the __init__ function from the parent. |
| ||implementation of fuzzing |
Member Function Documentation
This function is called by the __init__ function from the parent.
Don't define your own __init__ here!
Reimplemented from TestCase.
Definition at line 35 of file TestIntegerOverflowVpn.py.
The documentation for this class was generated from the following file: