Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 25 Mar 2015 15:27:47 +0800
From: Kai Zhao <>
Subject: Re: Ideas for the robustness gsoc task

> - List sources of input data and classify its trustworthiness (discuss in
john-dev). Preliminary, from untrusted to less untrusted:
> -- hashes
> -- wordlists
> -- rules
> -- chr
> -- config files (non-rules parts)
> -- command line options
> -- environment variables

We should fuzz those files: hashes, wordlists, rules, chr, config files,
command line
options and environment variables.

> - fuzz chr files
> - (Dynamic analysis and Fuzzing) Build for different platforms: at least
32-bit, ideally big-endian

Why only list "-fuzz chr files"?



Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.