Jag har tidigare bloggat ett par gånger om fuzzing. Justin Seitz har släppt en ny fuzzer som arbetar på med ioctls:
ioctlizer is an attempt at fuzzing Windows IOCTL requests. It is split into two separate tools, ioctltrap.py and ioctlizer.py.ioctltrap – used to spawn or attach to a user-mode process that interacts with a device (i.e. wireshark.exe). By hooking the Win32 system calls that are required to interact with a device driver, it builds a global test case list to be used when fuzzing the device(s).
ioctlizer – used to import the trapped IOCTL/Read/Write test cases, and begin mutating them. Easily extended mutators, as only the most basic of mutations is included in the fuzzer itself.
För mer information se ioctlizers sida på Google Code, eller ladda ner koden till ioctl.
No related posts.
Related posts brought to you by Yet Another Related Posts Plugin.