During a penetration test, you are tasked with evaluating the security of a network application. If your goal is to assess its resilience to attacks that may corrupt data handled by the application, which action would BEST demonstrate the application's vulnerability to data corruption?
Intercepting traffic between the application and its clients to analyze data packets
Jamming the network to interrupt the application's transmission
Overloading the application with an intentional buffer overflow
Conducting fuzz testing by sending a variety of malformed inputs to the application