.

Fuzzing with Fuzzers

<<

Dertweiller

Newbie
Newbie

Posts: 3

Joined: Fri Apr 27, 2007 12:49 pm

Post Sun May 20, 2007 3:59 pm

Fuzzing with Fuzzers

Hi there,

I was wondering if anyone knew where I could get information on "A how-to giude on Fuzzing Applications"? If you do know, can you please send me a link?

Thanks

Dertweiller
<<

goAci

Newbie
Newbie

Posts: 2

Joined: Thu Jul 12, 2007 3:30 am

Post Thu Jul 12, 2007 4:54 am

Re: Fuzzing with Fuzzers

Dertweiller wrote:Hi there,

I was wondering if anyone knew where I could get information on "A how-to giude on Fuzzing Applications"? If you do know, can you please send me a link?

Thanks

Dertweiller

what exactly does "Fuzzing Application" mean?
tia
<<

What90

Full Member
Full Member

Posts: 120

Joined: Sat Jun 09, 2007 2:23 am

Location: Syndey, Australia

Post Thu Jul 12, 2007 6:06 am

Re: Fuzzing with Fuzzers

Fuzzing is a software testing technique where you supply a program with faulty or randomized data in place of its normally expected input.

Here's some more to read on it:

http://reddevnews.com/techbriefs/articl ... ialsid=261

http://appliedsec.com/resources.html

Playing with Ruby to build a fuzzer framework:
http://www.devx.com/security/Article/33559
<<

don

User avatar

Administrator
Administrator

Posts: 4226

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Thu Jul 12, 2007 10:08 am

Re: Fuzzing with Fuzzers

I just got a review copy of:

Fuzzing - Brute Force Vulnerability Discovery

By Michael Sutton, Adam Greene and Pedram Amini (Foreword by H.D. Moore)

Haven't read it yet, so I can't comment fully, but it's worth a look.

Don
CISSP, MCSE, CSTA, Security+ SME
<<

Kev

Post Sun Jul 15, 2007 12:38 pm

Re: Fuzzing with Fuzzers

Fuzzing is an important part of looking for vulnerabilities. Spike still seems to be the popular fuzzer.  Many people think writing your own exploit code is extremely difficult and you must be a programming wiz.  Thats no longer true since the advent of fuzzers.  You do need to understand windows memory and cpu registries and some assembly instructions. You dont really need to write a lot of code because there exists well written shell code that you can just copy and paste and edit as needed !

You find an app that you want to test and then run it. Run a debugger and then your fuzzer.  If the program crashes, your in luck. At that point you begin to  review your debugger and look for cpu registries after the crash. Find the area where you can insert your shell and create your exploit. You're  trying to push the buffer to except your code. Well, there is a bit more to it than that but most of it is really just understanding things like binary trees and there are auto scripts available to help with this. Your basically looking for the address to insert your shell code.  If you understand where to point your shell code, you can just about copy and paste everything and then edit it to point where it needs to go.

This is all depends on the program having vulnerable code and the its getting harder to find really easily exploitable programs. If you are starting to learn you should find an old version of a program and play with it, one that was known for having a lot of holes.  Once you do find that you have found an exploit that works and is stable, its like finding gold. Its an awesome feeling.  Of course you have to remember that many others are out there testing the same software with the same fuzzer if you are using Spike so dont think you are the only one with that exploit, lol.  It eventually gets out because people are always trading their exploits to get others or they have to brag ,etc and the vulnerable code is corrected sooner or later, which is good.   
Last edited by Kev on Sun Jul 15, 2007 1:23 pm, edited 1 time in total.
<<

Kev

Post Sun Jul 15, 2007 2:45 pm

Re: Fuzzing with Fuzzers

One other thought I forgot to post is there is another good reason to become good at fuzzing.  It is only going to get more and more competitive in the world of security as more  people get attracted to this line of work.  If you can show you created your own exploit against a vulnerable program, its going to set you miles above most other applicants. 

Return to Tutorials

Who is online

Users browsing this forum: No registered users and 0 guests

.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software