Post Tue May 08, 2007 7:57 pm


Hi Guys,

Can someone, anyone, everyone, please tell me where I can find some good technical papers on how to use all the fuzzers in BT v2 to find exploits in Operating Systems and general application software?
I came across a few that only defined what they were but never went into detail to show you some practical examples.

Dertweiller  ;)