Port 22

How regular expression and fuzzing change my approach for finding vulnerabilities (Series part 1.)