下载  >  安全技术  >  系统安全  > blackhat-fuzzing

blackhat-fuzzing 评分:

关于fuzzing测试方面的指导手册,里面涵盖了Fuzzing的各个方面,值得一看。
Agenda What constitutes real-life offensive fuzzing(techniques and mindset How each of the stages is typically implemented and how to improve them for maximized effectiveness Tips tricks on the examples of software I've fuzzed during the past few years: Adobe Reader, Adobe flash, Windows Kernel, Oracle Java, Hex-Rays IDA Pro FreeType2, FFmpeg, pdfium, Wireshark Fuzzing Fuzz testing or fuzzing is a software testing technique, often automated or semi-automated, that involves providing invalid, unexpected, or random data to the inputs of a computer program http://en.wikipediaorg/wiki/fuzztesting In my (and this talks)case Software commonly used programs and libraries, both open and closed-source written in native languages(C/C++ etc ) which may be used as targets for memory corruption-style o-day attacks Inputs= files of different (un)documented formats processed by the target software(e.g. websites, applets, images videos, documents etc. On a scheme START choose input mutate in feed to target yes no target save input crashed Easy to learn, hard to master Key questions How do we choose the fuzzing target in the first place How are the inputs generated? What is the base set of the input samples? where do we get it from? How do we mutate the inputs? How do we detect software failures/ crashes? Do we make any decisions in future fuzzing based on the software's behavior in the past? How do we minimize the interesting inputs/mutations? How do we recognize unique bugs What if the software requires user interaction and or displays windows? What if the application keeps crashing at a single location due to an easily reachable bug What if the fuzzed file format includes checksums other consistency checks, compression or encryption? Let's get technical Gathering an initial corpus of input files a desired step in a majority of cases Makes it possible to reach some code paths and program states immediately after starting the fuzzing. May contain complex data structures which would be difficult or impossible to generate organically using just code coverage information e.g. magic values correct headers, compression trees etc Even if the same inputs could be constructed during fuzzing with an empty seed, having them right at the beginning saves a lot of cpu time Corpora containing files in specific formats may be frequently reused to fuzz various software projects which handle them

...展开详情
2018-01-28 上传 大小:6.12MB
举报 收藏
分享
Hardware Fuzzing(Fuzzer)

Hardware Fuzzing(Fuzzer), 硬件模糊测试的代码。都打包在里面了

立即下载
ftp fuzzing工具

支持ftp漏洞挖掘,集成ftp专用fuzzing测试用例,只需输入ip和端口

立即下载
浏览器Fuzzing技术 2014

Fuzzing技术已被证明可以非常有效地找出网页浏览器漏洞。随著浏览器厂商提供的漏洞奖金悬赏计划与0day漏洞交易市场的成长,更多研究人员加入浏览器漏洞挖掘的行列。能够胜过这些漏洞挖掘巨头的办法,就是使用智能Fuzzing技术,以及关注特定的浏览器API和行为。本文档将说明目前对于内存破坏漏洞、浏览器模糊测试技术的概况和局限性,然后将介绍一种新的针对特定浏览器方面的Fuzzing算法,并解释其背后的工作原理,以及在使用这种方法时发现的一系列可被利用的内存破坏漏洞。

立即下载
html+css+js制作的一个动态的新年贺卡

该代码是http://blog.csdn.net/qq_29656961/article/details/78155792博客里面的代码,代码里面有要用到的图片资源和音乐资源。

立即下载
Camtasia 9安装及破解方法绝对有效

附件中注册方法亲测有效,加以整理与大家共享。 由于附件大于60m传不上去,另附Camtasia 9百度云下载地址。免费自取 链接:http://pan.baidu.com/s/1kVABnhH 密码:xees

立即下载
电磁场与电磁波第四版谢处方 PDF

电磁场与电磁波第四版谢处方 (清晰版),做天线设计的可以作为参考。

立即下载
压缩包爆破解密工具(7z、rar、zip)

压缩包内包含三个工具,分别可以用来爆破解密7z压缩包、rar压缩包和zip压缩包。

立即下载
算法第四版 高清完整中文版PDF

《算法 第4版 》是Sedgewick之巨著 与高德纳TAOCP一脉相承 是算法领域经典的参考书 涵盖所有程序员必须掌握的50种算法 全面介绍了关于算法和数据结构的必备知识 并特别针对排序 搜索 图处理和字符串处理进行了论述 第4版具体给出了每位程序员应知应会的50个算法 提供了实际代码 而且这些Java代码实现采用了模块化的编程风格 读者可以方便地加以改造

立即下载
等级考试运行环境 VB6 VFP6 VC6 VC2010Express

等级考试运行环境 VB6 VFP6 VC6 VC2010Express(VC2010学习版)。其他环境,可以去等考官网下载。

立即下载
jdk1.8下载

jdk1.8下载

立即下载
DroidCamX 6.5 电脑端和手机端(2018年版本)

DroidCamX 6.5 适配安卓8.0和win10系统。让你的安卓手机变成摄像头。

立即下载
身份证号对应籍贯表大全(共6456条)

身份证号对应籍贯表大全(共6456条),可以很方便查出身份证对应的籍贯,方便工作、项目使用

立即下载
使用STM32F103C8开发MLX90621的例程

使用STM32F103C8作为芯片的开发板,通过I2C协议,对MLX90621进行开发的例程

立即下载