This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:extra:stateless-fuzzing [2014/07/14 10:34] drcomaneci [Sulley Data Model] |
session:extra:stateless-fuzzing [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = Session 07 | + | ====== |
- | ====== Stateless Fuzzing ====== | + | |
- | == Slides | + | ===== Slides |
- | <note warning> | + | The slides can be found {{: |
- | TODO | + | |
- | </ | + | |
- | == Tutorials | + | ===== Tutorials |
- | + | ||
- | <note warning> | + | |
- | Under Development | + | |
- | </ | + | |
//"To fuzz or not to fuzz ?"// | //"To fuzz or not to fuzz ?"// | ||
Line 40: | Line 33: | ||
* Generation-based fuzzers where you contruct the data from the ground up based on its specific structure | * Generation-based fuzzers where you contruct the data from the ground up based on its specific structure | ||
- | < | + | When generating |
- | TODO: Patterns when generating data | + | * Integers |
- | </note> | + | * Negative numbers (0xFFFFFFFF, |
+ | * Large numbers (0x7FFFFFFF, | ||
+ | * Small values such as 0-10 | ||
+ | * Header values identifying the length of header/data segments | ||
+ | * ASCII | ||
+ | * Large strings / empty strings | ||
+ | * Strings with " | ||
+ | * Long string, short tag | ||
+ | * Short string, long tag | ||
+ | * Strings with " | ||
+ | * Strings with format specifiers | ||
Following this, the generated fuzz data is **executed against the target application** and we **monitor succesively for exceptions**. After each fuzz test, the application is killed and restored to its initial state. | Following this, the generated fuzz data is **executed against the target application** and we **monitor succesively for exceptions**. After each fuzz test, the application is killed and restored to its initial state. | ||
Once a crash/hang has been found, we proceed to **determine whether the vulnerability is exploitable**. | Once a crash/hang has been found, we proceed to **determine whether the vulnerability is exploitable**. | ||
- | === Stateless vs. Stateful Fuzzing | + | ==== Stateless vs. Stateful Fuzzing |
We've hinted a bit in the preceding section about restoring the application to its initial state after each fuzz test is run. This can be as simple as just restarting the application in the case of **stateless fuzzing** where we have a fixed state from which we're trying to fuzz to performing the necessary operations to get the application into a specific state before performing the fuzz test in the case of **stateful fuzzing**. | We've hinted a bit in the preceding section about restoring the application to its initial state after each fuzz test is run. This can be as simple as just restarting the application in the case of **stateless fuzzing** where we have a fixed state from which we're trying to fuzz to performing the necessary operations to get the application into a specific state before performing the fuzz test in the case of **stateful fuzzing**. | ||
In this session we'll be covering only stateless fuzzing but we will also go into stateful fuzzing in the next session which will build on the knowledge gained in this one. | In this session we'll be covering only stateless fuzzing but we will also go into stateful fuzzing in the next session which will build on the knowledge gained in this one. | ||
- | === Fuzzing Frameworks | + | ==== Fuzzing Frameworks |
A fuzzing framework is mostly concerned with generating the fuzzing data, but it can also serve the following aditional functions: | A fuzzing framework is mostly concerned with generating the fuzzing data, but it can also serve the following aditional functions: | ||
* Orchestrate running the program against the generated test data and see whether it crashed | * Orchestrate running the program against the generated test data and see whether it crashed | ||
Line 58: | Line 61: | ||
Most fuzzing frameworks are designed only for the data generation stage, leaving the test execution to the user. For this particular lab we will be using the Sulley Fuzzing Framework which, as we'll see, covers all of the above functionality. | Most fuzzing frameworks are designed only for the data generation stage, leaving the test execution to the user. For this particular lab we will be using the Sulley Fuzzing Framework which, as we'll see, covers all of the above functionality. | ||
- | === The Sulley Fuzzing Framework | + | ==== The Sulley Fuzzing Framework |
{{ https:// | {{ https:// | ||
Line 67: | Line 70: | ||
* Session: Link your developed requests together to form a session, attach the various available Sulley monitoring agents (network, debugger, etc...) and commence fuzzing. | * Session: Link your developed requests together to form a session, attach the various available Sulley monitoring agents (network, debugger, etc...) and commence fuzzing. | ||
* Post Mortem: Review the generated data and monitored results. Replay individual test cases. | * Post Mortem: Review the generated data and monitored results. Replay individual test cases. | ||
- | === Setting up Sulley | + | ==== Setting up Sulley |
The first step in installing Sulley is to clone the Github repository for it: | The first step in installing Sulley is to clone the Github repository for it: | ||
<code bash> | <code bash> | ||
Line 112: | Line 115: | ||
[-l|--log_level LEVEL] | [-l|--log_level LEVEL] | ||
</ | </ | ||
- | === Running a fuzz scenario with Sulley | + | ==== Running a fuzz scenario with Sulley |
Without going into all the details in the [[http:// | Without going into all the details in the [[http:// | ||
Line 121: | Line 124: | ||
- **Monitoring Interface**: | - **Monitoring Interface**: | ||
- | ==== Concrete Example | + | === Concrete Example |
Let's start by considering a concrete fuzzing example. Consider we have a network service listening on port 9999 and it supports the following commands : | Let's start by considering a concrete fuzzing example. Consider we have a network service listening on port 9999 and it supports the following commands : | ||
<code bash> | <code bash> | ||
Line 148: | Line 151: | ||
</ | </ | ||
- | ==== Protocol Fuzzer | + | === Protocol Fuzzer |
The fuzzer for it would look as follows (sulley/ | The fuzzer for it would look as follows (sulley/ | ||
<code python> | <code python> | ||
Line 256: | Line 259: | ||
s.fuzz() | s.fuzz() | ||
</ | </ | ||
- | ==== Starting the Network and Process Monitor | + | === Starting the Network and Process Monitor |
<code bash> | <code bash> | ||
mkdir auditsvulnserver | mkdir auditsvulnserver | ||
Line 265: | Line 268: | ||
In case you have any issues with the network_monitor.py script exiting while trying to capture the first fuzz test, please modify the call to pcapy.open_live so that it takes 4096 and True as the second and third parameters. | In case you have any issues with the network_monitor.py script exiting while trying to capture the first fuzz test, please modify the call to pcapy.open_live so that it takes 4096 and True as the second and third parameters. | ||
</ | </ | ||
- | ==== Starting the fuzzing process | + | === Starting the fuzzing process |
<code bash> | <code bash> | ||
python vulnserver.py | python vulnserver.py | ||
</ | </ | ||
< | < | ||
- | The **examples** folder contains a few other relevant Sulley scripts that demo de framework' | + | The **examples** folder contains a few other relevant Sulley scripts that demo the framework functionality. |
</ | </ | ||
- | === Sulley Data Model | + | ==== Sulley Data Model ==== |
Now that we've had our first taste of how a fuzzer can be defined using Sulley, let's take a closer look at the options available for defining the data model and what they can do. | Now that we've had our first taste of how a fuzzer can be defined using Sulley, let's take a closer look at the options available for defining the data model and what they can do. | ||
- | ==== Defining a new request | + | === Defining a new request |
<code python> | <code python> | ||
s_initialize(" | s_initialize(" | ||
</ | </ | ||
- | ==== Static and Random Primitives | + | === Static and Random Primitives |
Static primitives are never mutated. | Static primitives are never mutated. | ||
<code python> | <code python> | ||
Line 298: | Line 301: | ||
s_random(min_length, | s_random(min_length, | ||
</ | </ | ||
- | ==== Integers | + | === Integers |
* 1 byte: s_byte(), s_char() | * 1 byte: s_byte(), s_char() | ||
* 2 bytes: s_word(), s_short() | * 2 bytes: s_word(), s_short() | ||
Line 304: | Line 307: | ||
* 8 bytes: s_qword(), s_double() | * 8 bytes: s_qword(), s_double() | ||
- | ==== Strings and Delimiters | + | === Strings and Delimiters |
<code python> | <code python> | ||
# fuzzes the string: <BODY bgcolor=" | # fuzzes the string: <BODY bgcolor=" | ||
Line 318: | Line 321: | ||
</ | </ | ||
- | ==== Blocks & Groups | + | === Blocks & Groups |
<code python> | <code python> | ||
Line 346: | Line 349: | ||
s_block_end(" | s_block_end(" | ||
</ | </ | ||
+ | |||
+ | === Dependencies === | ||
+ | <code python> | ||
+ | s_short(" | ||
+ | # opcode 10 expects an authentication sequence. | ||
+ | if s_block_start(" | ||
+ | s_string(" | ||
+ | s_delim(" | ||
+ | s_string(" | ||
+ | s_static(" | ||
+ | s_string(" | ||
+ | s_delim(" | ||
+ | s_delim(" | ||
+ | s_block_end() | ||
+ | |||
+ | # opcodes 15 and 16 expect a single string hostname. | ||
+ | if s_block_start(" | ||
+ | s_string(" | ||
+ | s_block_end() | ||
+ | |||
+ | # the rest of the opcodes take a string prefixed with two underscores. | ||
+ | if s_block_start(" | ||
+ | s_static(" | ||
+ | s_string(" | ||
+ | s_block_end() | ||
+ | |||
+ | </ | ||
+ | |||
+ | === Block Helpers === | ||
+ | <code python> | ||
+ | # table entry: [type][len][string][checksum] | ||
+ | if s_block_start(" | ||
+ | # we don't know what the valid types are, so we'll fill this in with random data. | ||
+ | s_random(" | ||
+ | # next, we insert a sizer of length 2 for the string field to follow. | ||
+ | s_size(" | ||
+ | # block helpers only apply to blocks, so encapsulate the string primitive in one. | ||
+ | if s_block_start(" | ||
+ | # the default string will simply be a short sequence of C's. | ||
+ | s_string(" | ||
+ | s_block_end() | ||
+ | # append the CRC-32 checksum of the string to the table entry. | ||
+ | s_checksum(" | ||
+ | s_block_end() | ||
+ | |||
+ | # repeat the table entry from 100 to 1,000 reps stepping 50 elements on each iteration. | ||
+ | s_repeat(" | ||
+ | |||
+ | </ | ||
+ | |||
< | < | ||
You can find more information about these primitives in the [[http:// | You can find more information about these primitives in the [[http:// | ||
</ | </ | ||
- | == File Format Fuzzing | + | ===== File Format Fuzzing |
A File format is quite similar to a protocol meaning that it can be treated as a standardized means of communication. As such, applications should be able to deal with anomalies in the files they are parsing by implementing: | A File format is quite similar to a protocol meaning that it can be treated as a standardized means of communication. As such, applications should be able to deal with anomalies in the files they are parsing by implementing: | ||
* input validation controls | * input validation controls | ||
Line 362: | Line 415: | ||
As always, we can have the same two approaches when generating files for fuzzing, meaning mutation-based fuzzers (notSPIKEfile) and generation-based fuzzers (SPIKEfile). | As always, we can have the same two approaches when generating files for fuzzing, meaning mutation-based fuzzers (notSPIKEfile) and generation-based fuzzers (SPIKEfile). | ||
- | === SPIKEfile | + | ==== SPIKEfile |
SPIKEfile is a Linux generation-based file fuzzer based on SPIKE. Fuzzers may be defined for it with the same SPIKE script block based notation as we've seen with Sulley. | SPIKEfile is a Linux generation-based file fuzzer based on SPIKE. Fuzzers may be defined for it with the same SPIKE script block based notation as we've seen with Sulley. | ||
- | ==== Installing SPIKEfile | + | === Installing SPIKEfile |
<code bash> | <code bash> | ||
wget http:// | wget http:// | ||
Line 373: | Line 426: | ||
< | < | ||
In case you run into any problems with compiling SPIKEfile, please use the following {{: | In case you run into any problems with compiling SPIKEfile, please use the following {{: | ||
+ | Aslo, modify the FLAGS option: | ||
+ | < | ||
+ | |||
+ | Modify the SPIKEfile Makefile: | ||
+ | < | ||
+ | CFLAGS=-L$(LIBDISASM) -L. -m32 | ||
+ | $(LD) -shared -melf_i386 -soname libdlrpc.so -o libdlrpc.so $(OBJ) | ||
+ | </ | ||
+ | |||
</ | </ | ||
- | ==== Running SPIKEfile | + | === Running SPIKEfile |
<code bash> | <code bash> | ||
export LD_LIBRARY_PATH=path/ | export LD_LIBRARY_PATH=path/ | ||
Line 399: | Line 461: | ||
| | ||
</ | </ | ||
- | ==== Example SPIKEfile .spk script | + | === Example SPIKEfile .spk script |
< | < | ||
s_blocksize_string(" | s_blocksize_string(" | ||
Line 410: | Line 472: | ||
Other SPK script options may be found by inspecting the **spike.c** source file. You'll have to use the source Luke for this one. | Other SPK script options may be found by inspecting the **spike.c** source file. You'll have to use the source Luke for this one. | ||
</ | </ | ||
- | === notSPIKEfile | + | ==== notSPIKEfile |
notSPIKEfile is a Linux based file format fuzzing tool. It was designed to automate the execution and launching of applications and detection of exceptions caused by fuzzed file formats. It's a mutation based fuzzing tool meaning that starting from a valid input file it will attempt and modify the file byte by byte (or some other pattern) in order to produce test cases. | notSPIKEfile is a Linux based file format fuzzing tool. It was designed to automate the execution and launching of applications and detection of exceptions caused by fuzzed file formats. It's a mutation based fuzzing tool meaning that starting from a valid input file it will attempt and modify the file byte by byte (or some other pattern) in order to produce test cases. | ||
- | ==== Installing and Compiling notSPIKEfile | + | === Installing and Compiling notSPIKEfile |
<code bash> | <code bash> | ||
wget http:// | wget http:// | ||
Line 421: | Line 483: | ||
< | < | ||
In case you run into any trouble with compiling libdisasm, please modify libdisasm/ | In case you run into any trouble with compiling libdisasm, please modify libdisasm/ | ||
+ | Also, modify the following lines in the Makefile: | ||
+ | < | ||
+ | FLAGS = $(INCLUDE) -m32 -O3 -ggdb | ||
+ | </ | ||
+ | and remove quickdis from compiling. | ||
+ | |||
+ | In the Makefile from noSPIKEfile also change the following: | ||
+ | < | ||
+ | CFLAGS=-m32 | ||
+ | </ | ||
+ | and | ||
+ | < | ||
+ | all $(OBJ): | ||
+ | $(CC) $(OBJ) $(CFLAGS) -o $(EXE) $(LIBS) | ||
+ | </ | ||
+ | |||
</ | </ | ||
- | ==== Running notSPIKEfile | + | === Running notSPIKEfile |
<code bash> | <code bash> | ||
export LD_LIBRARY_PATH=path/ | export LD_LIBRARY_PATH=path/ | ||
Line 461: | Line 539: | ||
</ | </ | ||
- | == Tasks | + | ===== Tasks ===== |
- | === Manual Fuzzing | + | ==== Manual Fuzzing |
Download the following archive containing a linux binary {{: | Download the following archive containing a linux binary {{: | ||
<note tip> | <note tip> | ||
- | Please bare in mind that when a new connection is made to the service, a new thread | + | Please bare in mind that when a new connection is made to the service, a new process |
</ | </ | ||
- | Once you've discovered something, go ahead and analyze | + | < |
- | === Automated Fuzzing | + | The goal of this task is to trigger a crash of the program. |
- | Download the following binary | + | </note> |
- | === File Format Fuzzing | + | Once you've discovered something, go ahead and analyze the vulnerability with GDB to see if it's indeed exploitable. You don't need to create an exploit, just get an idea of how you could exploit it. |
+ | ==== Automated Fuzzing ==== | ||
+ | Sync the following github repository: | ||
+ | <code bash> | ||
+ | git clone https:// | ||
+ | </ | ||
+ | Compile the code by executing | ||
+ | <code bash> | ||
+ | ./make.em | ||
+ | </ | ||
+ | |||
+ | Explore the structure of the Hyper Text Cofee Pot Control Protocol (HTCPCP) in [[http:// | ||
+ | <note tip> | ||
+ | The HTCPCP server forks a new process initially upon starting. You may have to modify Sulley' | ||
+ | </ | ||
+ | |||
+ | ==== File Format Fuzzing | ||
+ | |||
+ | Sync the following github repository: | ||
+ | <code bash> | ||
+ | git clone https:// | ||
+ | </ | ||
+ | |||
+ | and compile it: | ||
+ | |||
+ | <code bash> | ||
+ | make | ||
+ | </ | ||
- | Download the following binary <TO DO>. Try to understand what types of files it reads and writes and how they are structured. Fuzz it using notSPIKEfile in order to discover vulnerabilities. | + | The application |
+ | Fuzz it using notSPIKEfile in order to discover vulnerabilities | ||
- | == References | + | ===== References |
* [[https:// | * [[https:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
+ | * [[http:// |