This technique involves trying to discover a software program's vulnerabilities by providing unexpected, invalid or random input to see how the program responds.
This technique involves trying to discover a software program's vulnerabilities by providing unexpected, invalid or random input to see how the program responds.