GeistHaus
log in · sign up

american fuzzy lop (2.52b)

lcamtuf.coredump.cx

A revolutionary coverage-driven fuzzer credited with finding countless vulnerabilities in open-source code.

100 pages link to this URL
Count Upon Security

Increase security awareness. Promote, reinforce and learn security skills.

0 inbound links website en Digital Forensics and Incident ResponseSecurity EssentialsIntrusion AnalysisAnniversaryIncident Handling and Hacker TechniquesMalware AnalysisThreat IntelligenceExploitationFuzzing
Surprisingly Turing-Complete

A catalogue of software constructs, languages, or APIs which are unexpectedly Turing-complete; implications for security and reliability.

9 inbound links en ai/nncs/cellular-automatoninsight-pornphilosophy/mindreinforcement-learning/safe
Just a Whole Bunch of Different Tests

I’ve been working on a bunch of longform obligation pieces and while they’re a lot of fun, they’re also steadily driving me insane. So I took a day off to write about all of the kinds of automated testing I know about. I’m defining tests here to be “an independent verification program that, as part of verification, executes the code we want to verify.” This means types are not tests, as they don’t involve execution of the code, and contracts are not tests, because they’re not executed as an independent program.

1 inbound link article en Programming TestingList
GitHub - secfigo/Awesome-Fuzzing: A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.

A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Develo...

2 inbound links object en repository:62374656
Luciano Remes | What is a Fuzzer?

Inspiration: I wrote my undergrad Thesis on a new distributed fuzzer called Hopper that I built, and I always get the question: "What is a…

0 inbound links article en FuzzingSystemsSecurityExploitesCVEAFLAFL++Fuzzer
So I decided to take my work back underground

To stop it falling into the wrong hands

0 inbound links website en Random thoughtsazureBusinessCloudcatsCyberLinuxMicrosoftPythonSQL Serveredxdata scienceC++f#HaskellOcamlRScalaAI ChatGPTcoronaviruscurrentaffairswfhblackandwhitecatblackcatcatgobbolinoobituaryripCybercybersecuritypasswordsPythonazureCloudLinuxMicrosoftsecurityUbuntuasciilanguagesprogrammingmachine learningstatistics
Fuzzing With AFL-Fuzz, a Practical Example ( AFL vs Binutils ) | evilsocket

It’s been a few weeks I’ve been playing with afl-fuzz ( american fuzzy lop ), a great tool from lcamtuf which uses binary instrumentation to create edge-cases…

1 inbound link article en Cybersecurity binary analysisexploitvulnerability researchaflfuzzinglcamtuffuzzerbinary instrumentationgccclangqemullvmcrashamerican fuzzy lopcrash analysissecurity testing
Introducing Ruzzy, a coverage-guided Ruby fuzzer

Trail of Bits is excited to introduce Ruzzy, a coverage-guided fuzzer for pure Ruby code and Ruby C extensions. Fuzzing helps find bugs in software that processes untrusted input. In pure Ruby, these bugs may result in unexpected exceptions that could lead to denial of service, and in Ruby C extensions, they […]

3 inbound links article en application-securityfuzzingtool-release application-securityfuzzingtool-release
Fuzzing the hell out of conntrack tools - blog.dornea.nu

Fuzzing is nowadays the attack technique used by a lot of pentesters and security researchers. Whether you’re looking for vulnerabilities in media files (pictures, videos, audio stuff) or just binary files, fuzzing is the right approach if you don’t want to do some static code analysis or debug the hell out of your targets. When it comes to fuzzing there are a few tools to mention that have established during the last years.

1 inbound link article en
Fuzzing ImageIO

Posted by Samuel Groß, Project ZeroThis blog post discusses an old type of issue, vulnerabilities...

1 inbound link article en
hyprblog

Vulnerability research, software development, and other technobabble.

0 inbound links website en
FLOSS Security

While source code is critical for user autonomy, it isn’t required to evaluate software security or understand run-time behavior. One of the biggest parts of the Free and Open Source Software definitions is the freedom to study a program and modify it; in other words, access to editable source code. I agree that such access is essential; however, far too many people support source availability for the wrong reasons. One such reason is that source code is necessary to have any degree of transparency into how a piece of software operates, and is therefore necessary to determine if it is at all secure or trustworthy.

0 inbound links article en posts Knowledge BasePrivacySecurity CC BY-SA 4.0
How to compile AFL's LLVM mode in OS X

American fuzzy lop aka AFL is one of the easiest and best fuzzers out there and should be part of your development cycle if you care at least one bit about the security of your code. Its performance in OS X is a bit of a let down because of issues at fork() system call. AFL warns you about this when compiling it: WARNING: Fuzzing on MacOS X is slow because of the unusually high overhead of fork() on this OS. Consider using Linux or *BSD. You can also use VirtualBox (virtualbox.org) to put AFL inside a Linux or *BSD VM.

0 inbound links article en post aflfuzzingos xxcode
Fuzzing in Go

Fuzzing is a testing technique with randomized inputs that is used to find problematic edge cas [...]

1 inbound link article en
The Importance of Fuzzing…Emulators?

Anyone familiar with computer security should be familiar with the concept of fuzzing. You throw garbage data at a program, over and over again, to see if it crashes. If it does, you might have a security issue. It’s a great way to do automated security testing of software, and has uncovered countless critical issues in software across the board. A popular fuzzing framework, American Fuzzy Lop (usually called afl or afl-fuzz for short), even has a “trophy case” for only a small percentage of the bugs it has uncovered—and there are over 150 bugs listed! Although usually not very intelligent, and limited in the scope of the bugs it can find, fuzzing is a common and effective practice for finding security bugs in software that is complex enough for issues to not be immediately obvious upon source inspection. Being a stochastic process, fuzzing can take a lot of time and careful selection of input cases (for mutational fuzzers) to produce good results. Conversely, it can also be left running processing as a background task for weeks or months with little interaction. As such, fuzzing is often employed in commonly deployed libraries such as libPNG, and widely used software such as Flash. A myriad of different projects use fuzzing to help find bugs, especially as software security comes more to the forefront of engineers’ minds.

Diving Into Coverage-Guided Fuzzing

How a 600-line Rust fuzzer discovers a 3-byte crash sequence in 9,000 iterations instead of 16 million

1 inbound link article en rustfuzzingtestingsimulationdiving-into
Fuzzing Bitcoin Consensus

TLDR I ran afl-fuzz against libbitcoinconsensus to discover interesting Bitcoin scripts and used them to search for Bitcoin reimplementations …

1 inbound link en CC BY 3.0
Microsoft Professional Program Cybersecurity

In a previous job, amongst many other things I was responsible for the tending of a small herd of HP DL-whatever servers, ~1500 machines all running RHEL. These were considered mission-critical for…

0 inbound links article en azureCloudCyberedxLinuxMicrosoftRandom thoughtsSQL Server azureCloudCyberLinuxMicrosoftsecurityUbuntu
Fuzzing with AFL is an Art

Using one of the test cases from the previous post , I examine what affects AFL's ability to find a bug placed by LAVA in a program. Along ...

0 inbound links BlogPosting en
Down the rabbit hole

My descent began with a user reporting a bug and I fear I am still on my way down. The bug was simple enough, a windows bitmap file cau...

Fuzzing TCP servers

Intro The architectures of software fuzzing setups that authors of security fuzzing tools had originally implemented were fairly simple. I...

1 inbound link BlogPosting en
Down the rabbit hole

My descent began with a user reporting a bug and I fear I am still on my way down. The bug was simple enough, a windows bitmap file cau...

Notes on firmware and tools

Introduction. In this blog post I mainly want to summarize my latest experiments at using clang's static analyzer and some thoughts on wha...

Property-Based Testing Is Fuzzing

“Property-based testing” refers to the idea of writing statements that should be true of your code (“properties”), and then using automated tooling to generate test inputs (typically, randomly-generated inputs of an appropriate type), and observe whether the properties hold for that input. If an input violates a property, you’ve demonstrated a bug, as well as a convenient example that demonstrates it. A classic example of property-based testing is testing a sort function:

0 inbound links article en post CC BY 4.0
Macros in Rust pt2

(Continuing from last time). procedural macros Also known as syntax extensions or syntax plugins or compiler plugins (which they are just a category of). I'll not get into the naming thing here, but I'll try and stick to 'procedural macro'. Procedural macros are implemented using pure Rust code at the

2 inbound links article en