Warning: Missing argument 2 for wpdb::prepare(), called in /home/stromber/public_html/kryptoblog/wp-content/plugins/wp-super-edit/wp-super-edit.core.class.php on line 109 and defined in /home/stromber/public_html/kryptoblog/wp-includes/wp-db.php on line 1222
ioctlizer en Win32 IOCTL-fuzzer » Kryptoblog

ioctlizer en Win32 IOCTL-fuzzer

December 10th, 2007 by Joachim Strömbergson Leave a reply »

Jag har tidigare bloggat ett par gånger om fuzzing. Justin Seitz har släppt en ny fuzzer som arbetar på med ioctls:

ioctlizer is an attempt at fuzzing Windows IOCTL requests. It is split into two separate tools, ioctltrap.py and ioctlizer.py.

ioctltrap – used to spawn or attach to a user-mode process that interacts with a device (i.e. wireshark.exe). By hooking the Win32 system calls that are required to interact with a device driver, it builds a global test case list to be used when fuzzing the device(s).

ioctlizer – used to import the trapped IOCTL/Read/Write test cases, and begin mutating them. Easily extended mutators, as only the most basic of mutations is included in the fuzzer itself.

För mer information se ioctlizers sida på Google Code, eller ladda ner koden till ioctl.

No related posts.

Related posts brought to you by Yet Another Related Posts Plugin.


Leave a Reply

You must be logged in to post a comment.