This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:extra:stateless-fuzzing [2015/07/06 19:10] Razvan Deaconescu [Manual Fuzzing] |
session:extra:stateless-fuzzing [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = Session 07 | + | ====== |
- | ====== Stateless Fuzzing ====== | + | |
- | == Slides | + | ===== Slides |
The slides can be found {{: | The slides can be found {{: | ||
- | == Tutorials | + | ===== Tutorials |
//"To fuzz or not to fuzz ?"// | //"To fuzz or not to fuzz ?"// | ||
Line 51: | Line 50: | ||
Once a crash/hang has been found, we proceed to **determine whether the vulnerability is exploitable**. | Once a crash/hang has been found, we proceed to **determine whether the vulnerability is exploitable**. | ||
- | === Stateless vs. Stateful Fuzzing | + | ==== Stateless vs. Stateful Fuzzing |
We've hinted a bit in the preceding section about restoring the application to its initial state after each fuzz test is run. This can be as simple as just restarting the application in the case of **stateless fuzzing** where we have a fixed state from which we're trying to fuzz to performing the necessary operations to get the application into a specific state before performing the fuzz test in the case of **stateful fuzzing**. | We've hinted a bit in the preceding section about restoring the application to its initial state after each fuzz test is run. This can be as simple as just restarting the application in the case of **stateless fuzzing** where we have a fixed state from which we're trying to fuzz to performing the necessary operations to get the application into a specific state before performing the fuzz test in the case of **stateful fuzzing**. | ||
In this session we'll be covering only stateless fuzzing but we will also go into stateful fuzzing in the next session which will build on the knowledge gained in this one. | In this session we'll be covering only stateless fuzzing but we will also go into stateful fuzzing in the next session which will build on the knowledge gained in this one. | ||
- | === Fuzzing Frameworks | + | ==== Fuzzing Frameworks |
A fuzzing framework is mostly concerned with generating the fuzzing data, but it can also serve the following aditional functions: | A fuzzing framework is mostly concerned with generating the fuzzing data, but it can also serve the following aditional functions: | ||
* Orchestrate running the program against the generated test data and see whether it crashed | * Orchestrate running the program against the generated test data and see whether it crashed | ||
Line 62: | Line 61: | ||
Most fuzzing frameworks are designed only for the data generation stage, leaving the test execution to the user. For this particular lab we will be using the Sulley Fuzzing Framework which, as we'll see, covers all of the above functionality. | Most fuzzing frameworks are designed only for the data generation stage, leaving the test execution to the user. For this particular lab we will be using the Sulley Fuzzing Framework which, as we'll see, covers all of the above functionality. | ||
- | === The Sulley Fuzzing Framework | + | ==== The Sulley Fuzzing Framework |
{{ https:// | {{ https:// | ||
Line 71: | Line 70: | ||
* Session: Link your developed requests together to form a session, attach the various available Sulley monitoring agents (network, debugger, etc...) and commence fuzzing. | * Session: Link your developed requests together to form a session, attach the various available Sulley monitoring agents (network, debugger, etc...) and commence fuzzing. | ||
* Post Mortem: Review the generated data and monitored results. Replay individual test cases. | * Post Mortem: Review the generated data and monitored results. Replay individual test cases. | ||
- | === Setting up Sulley | + | ==== Setting up Sulley |
The first step in installing Sulley is to clone the Github repository for it: | The first step in installing Sulley is to clone the Github repository for it: | ||
<code bash> | <code bash> | ||
Line 116: | Line 115: | ||
[-l|--log_level LEVEL] | [-l|--log_level LEVEL] | ||
</ | </ | ||
- | === Running a fuzz scenario with Sulley | + | ==== Running a fuzz scenario with Sulley |
Without going into all the details in the [[http:// | Without going into all the details in the [[http:// | ||
Line 125: | Line 124: | ||
- **Monitoring Interface**: | - **Monitoring Interface**: | ||
- | ==== Concrete Example | + | === Concrete Example |
Let's start by considering a concrete fuzzing example. Consider we have a network service listening on port 9999 and it supports the following commands : | Let's start by considering a concrete fuzzing example. Consider we have a network service listening on port 9999 and it supports the following commands : | ||
<code bash> | <code bash> | ||
Line 152: | Line 151: | ||
</ | </ | ||
- | ==== Protocol Fuzzer | + | === Protocol Fuzzer |
The fuzzer for it would look as follows (sulley/ | The fuzzer for it would look as follows (sulley/ | ||
<code python> | <code python> | ||
Line 260: | Line 259: | ||
s.fuzz() | s.fuzz() | ||
</ | </ | ||
- | ==== Starting the Network and Process Monitor | + | === Starting the Network and Process Monitor |
<code bash> | <code bash> | ||
mkdir auditsvulnserver | mkdir auditsvulnserver | ||
Line 269: | Line 268: | ||
In case you have any issues with the network_monitor.py script exiting while trying to capture the first fuzz test, please modify the call to pcapy.open_live so that it takes 4096 and True as the second and third parameters. | In case you have any issues with the network_monitor.py script exiting while trying to capture the first fuzz test, please modify the call to pcapy.open_live so that it takes 4096 and True as the second and third parameters. | ||
</ | </ | ||
- | ==== Starting the fuzzing process | + | === Starting the fuzzing process |
<code bash> | <code bash> | ||
python vulnserver.py | python vulnserver.py | ||
Line 277: | Line 276: | ||
</ | </ | ||
- | === Sulley Data Model | + | ==== Sulley Data Model ==== |
Now that we've had our first taste of how a fuzzer can be defined using Sulley, let's take a closer look at the options available for defining the data model and what they can do. | Now that we've had our first taste of how a fuzzer can be defined using Sulley, let's take a closer look at the options available for defining the data model and what they can do. | ||
- | ==== Defining a new request | + | === Defining a new request |
<code python> | <code python> | ||
s_initialize(" | s_initialize(" | ||
</ | </ | ||
- | ==== Static and Random Primitives | + | === Static and Random Primitives |
Static primitives are never mutated. | Static primitives are never mutated. | ||
<code python> | <code python> | ||
Line 302: | Line 301: | ||
s_random(min_length, | s_random(min_length, | ||
</ | </ | ||
- | ==== Integers | + | === Integers |
* 1 byte: s_byte(), s_char() | * 1 byte: s_byte(), s_char() | ||
* 2 bytes: s_word(), s_short() | * 2 bytes: s_word(), s_short() | ||
Line 308: | Line 307: | ||
* 8 bytes: s_qword(), s_double() | * 8 bytes: s_qword(), s_double() | ||
- | ==== Strings and Delimiters | + | === Strings and Delimiters |
<code python> | <code python> | ||
# fuzzes the string: <BODY bgcolor=" | # fuzzes the string: <BODY bgcolor=" | ||
Line 322: | Line 321: | ||
</ | </ | ||
- | ==== Blocks & Groups | + | === Blocks & Groups |
<code python> | <code python> | ||
Line 351: | Line 350: | ||
</ | </ | ||
- | ==== Dependencies | + | === Dependencies |
<code python> | <code python> | ||
s_short(" | s_short(" | ||
Line 378: | Line 377: | ||
</ | </ | ||
- | ==== Block Helpers | + | === Block Helpers |
<code python> | <code python> | ||
# table entry: [type][len][string][checksum] | # table entry: [type][len][string][checksum] | ||
Line 403: | Line 402: | ||
You can find more information about these primitives in the [[http:// | You can find more information about these primitives in the [[http:// | ||
</ | </ | ||
- | == File Format Fuzzing | + | ===== File Format Fuzzing |
A File format is quite similar to a protocol meaning that it can be treated as a standardized means of communication. As such, applications should be able to deal with anomalies in the files they are parsing by implementing: | A File format is quite similar to a protocol meaning that it can be treated as a standardized means of communication. As such, applications should be able to deal with anomalies in the files they are parsing by implementing: | ||
* input validation controls | * input validation controls | ||
Line 416: | Line 415: | ||
As always, we can have the same two approaches when generating files for fuzzing, meaning mutation-based fuzzers (notSPIKEfile) and generation-based fuzzers (SPIKEfile). | As always, we can have the same two approaches when generating files for fuzzing, meaning mutation-based fuzzers (notSPIKEfile) and generation-based fuzzers (SPIKEfile). | ||
- | === SPIKEfile | + | ==== SPIKEfile |
SPIKEfile is a Linux generation-based file fuzzer based on SPIKE. Fuzzers may be defined for it with the same SPIKE script block based notation as we've seen with Sulley. | SPIKEfile is a Linux generation-based file fuzzer based on SPIKE. Fuzzers may be defined for it with the same SPIKE script block based notation as we've seen with Sulley. | ||
- | ==== Installing SPIKEfile | + | === Installing SPIKEfile |
<code bash> | <code bash> | ||
wget http:// | wget http:// | ||
Line 427: | Line 426: | ||
< | < | ||
In case you run into any problems with compiling SPIKEfile, please use the following {{: | In case you run into any problems with compiling SPIKEfile, please use the following {{: | ||
+ | Aslo, modify the FLAGS option: | ||
+ | < | ||
+ | |||
+ | Modify the SPIKEfile Makefile: | ||
+ | < | ||
+ | CFLAGS=-L$(LIBDISASM) -L. -m32 | ||
+ | $(LD) -shared -melf_i386 -soname libdlrpc.so -o libdlrpc.so $(OBJ) | ||
+ | </ | ||
+ | |||
</ | </ | ||
- | ==== Running SPIKEfile | + | === Running SPIKEfile |
<code bash> | <code bash> | ||
export LD_LIBRARY_PATH=path/ | export LD_LIBRARY_PATH=path/ | ||
Line 453: | Line 461: | ||
| | ||
</ | </ | ||
- | ==== Example SPIKEfile .spk script | + | === Example SPIKEfile .spk script |
< | < | ||
s_blocksize_string(" | s_blocksize_string(" | ||
Line 464: | Line 472: | ||
Other SPK script options may be found by inspecting the **spike.c** source file. You'll have to use the source Luke for this one. | Other SPK script options may be found by inspecting the **spike.c** source file. You'll have to use the source Luke for this one. | ||
</ | </ | ||
- | === notSPIKEfile | + | ==== notSPIKEfile |
notSPIKEfile is a Linux based file format fuzzing tool. It was designed to automate the execution and launching of applications and detection of exceptions caused by fuzzed file formats. It's a mutation based fuzzing tool meaning that starting from a valid input file it will attempt and modify the file byte by byte (or some other pattern) in order to produce test cases. | notSPIKEfile is a Linux based file format fuzzing tool. It was designed to automate the execution and launching of applications and detection of exceptions caused by fuzzed file formats. It's a mutation based fuzzing tool meaning that starting from a valid input file it will attempt and modify the file byte by byte (or some other pattern) in order to produce test cases. | ||
- | ==== Installing and Compiling notSPIKEfile | + | === Installing and Compiling notSPIKEfile |
<code bash> | <code bash> | ||
wget http:// | wget http:// | ||
Line 475: | Line 483: | ||
< | < | ||
In case you run into any trouble with compiling libdisasm, please modify libdisasm/ | In case you run into any trouble with compiling libdisasm, please modify libdisasm/ | ||
+ | Also, modify the following lines in the Makefile: | ||
+ | < | ||
+ | FLAGS = $(INCLUDE) -m32 -O3 -ggdb | ||
+ | </ | ||
+ | and remove quickdis from compiling. | ||
+ | |||
+ | In the Makefile from noSPIKEfile also change the following: | ||
+ | < | ||
+ | CFLAGS=-m32 | ||
+ | </ | ||
+ | and | ||
+ | < | ||
+ | all $(OBJ): | ||
+ | $(CC) $(OBJ) $(CFLAGS) -o $(EXE) $(LIBS) | ||
+ | </ | ||
+ | |||
</ | </ | ||
- | ==== Running notSPIKEfile | + | === Running notSPIKEfile |
<code bash> | <code bash> | ||
export LD_LIBRARY_PATH=path/ | export LD_LIBRARY_PATH=path/ | ||
Line 515: | Line 539: | ||
</ | </ | ||
- | == Tasks | + | ===== Tasks ===== |
- | === Manual Fuzzing | + | ==== Manual Fuzzing |
Download the following archive containing a linux binary {{: | Download the following archive containing a linux binary {{: | ||
Line 530: | Line 554: | ||
Once you've discovered something, go ahead and analyze the vulnerability with GDB to see if it's indeed exploitable. You don't need to create an exploit, just get an idea of how you could exploit it. | Once you've discovered something, go ahead and analyze the vulnerability with GDB to see if it's indeed exploitable. You don't need to create an exploit, just get an idea of how you could exploit it. | ||
- | === Automated Fuzzing | + | ==== Automated Fuzzing |
Sync the following github repository: | Sync the following github repository: | ||
<code bash> | <code bash> | ||
Line 545: | Line 569: | ||
</ | </ | ||
- | === File Format Fuzzing | + | ==== File Format Fuzzing |
Sync the following github repository: | Sync the following github repository: | ||
Line 561: | Line 585: | ||
Fuzz it using notSPIKEfile in order to discover vulnerabilities and, afterwards using SPIKEfile. Compare and contrast the two approaches and findings. | Fuzz it using notSPIKEfile in order to discover vulnerabilities and, afterwards using SPIKEfile. Compare and contrast the two approaches and findings. | ||
- | == References | + | ===== References |
* [[https:// | * [[https:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// |