commit | cd95ee67bc38c0f4cc955bbaaa63a246b3a5c2d8 | [log] [tgz] |
---|---|---|
author | van Hauser <vh@thc.org> | Mon Feb 01 23:00:45 2021 +0100 |
committer | van Hauser <vh@thc.org> | Mon Feb 01 23:00:45 2021 +0100 |
tree | d45b3f0010d6a6cb033b450169a30ff481995413 | |
parent | 90fdafa1ad167f43fb42cdec2335fa7416cc633c [diff] |
code format qasan
Release Version: 3.00c
Github Version: 3.01a
Repository: https://github.com/AFLplusplus/AFLplusplus
afl++ is maintained by:
Originally developed by Michał “lcamtuf” Zalewski.
afl++ is a superior fork to Google's afl - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
If you want to use afl++ for your academic work, check the papers page on the website.
With afl++ 3.0 we introduced changes that break some previous afl and afl++ behaviours and defaults:
instrumentation/
folder.-S default
is assumed, so more fuzzers can easily be added later-i
input directory option now descends into subdirectories. It also does not fatal on crashes and too large files, instead it skips them and uses them for splicing mutationsAFL_TESTCACHE_SIZE
(in MB). Good values are between 50-500 (default: 50).afl++ supports llvm up to version 12, very fast binary fuzzing with QEMU 5.1 with laf-intel and redqueen, unicorn mode, gcc plugin, full *BSD, Solaris and Android support and much, much, much more.
Feature/Instrumentation | afl-gcc | llvm | gcc_plugin | qemu_mode | unicorn_mode |
---|---|---|---|---|---|
NeverZero | x86[_64] | x(1) | x | x | x |
Persistent Mode | x | x | x86[_64]/arm[64] | x | |
LAF-Intel / CompCov | x | x86[_64]/arm[64] | x86[_64]/arm | ||
CmpLog | x | x86[_64]/arm[64] | |||
Selective Instrumentation | x | x | x | ||
Non-Colliding Coverage | x(4) | (x)(5) | |||
Ngram prev_loc Coverage | x(6) | ||||
Context Coverage | x(6) | ||||
Auto Dictionary | x(7) | ||||
Snapshot LKM Support | x(8) | x(8) | (x)(5) |
-x
Among others, the following features and patches have been integrated:
So all in all this is the best-of afl that is out there :-)
For new versions and additional information, check out: https://github.com/AFLplusplus/AFLplusplus
To compare notes with other users or get notified about major new features, send a mail to afl-users+subscribe@googlegroups.com.
See docs/QuickStartGuide.md if you don't have time to read this file - however this is not recommended!
The following branches exist:
For releases, please see the Releases tab.
We have several ideas we would like to see in AFL++ to make it even better. However, we already work on so many things that we do not have the time for all the big ideas.
This can be your way to support and contribute to AFL++ - extend it to do something cool.
We have an idea list in docs/ideas.md.
For everyone who wants to contribute (and send pull requests) please read CONTRIBUTING.md before your submit.
An easy way to install afl++ with everything compiled is available via docker: You can use the Dockerfile (which has gcc-10 and clang-11 - hence afl-clang-lto is available!) or just pull directly from the docker hub:
docker pull aflplusplus/aflplusplus docker run -ti -v /location/of/your/target:/src aflplusplus/aflplusplus
This image is automatically generated when a push to the stable repo happens. You will find your target source code in /src in the container.
If you want to build afl++ yourself you have many options. The easiest choice is to build and install everything:
sudo apt install build-essential python3-dev automake flex bison libglib2.0-dev libpixman-1-dev clang python3-setuptools clang llvm llvm-dev libstdc++-dev make distrib sudo make install
It is recommended to install the newest available gcc, clang and llvm-dev possible in your distribution!
Note that “make distrib” also builds instrumentation, qemu_mode, unicorn_mode and more. If you just want plain afl++ then do “make all”, however compiling and using at least instrumentation is highly recommended for much better results - hence in this case
make source-only
is what you should choose.
These build targets exist:
Unless you are on Mac OS X you can also build statically linked versions of the afl++ binaries by passing the STATIC=1 argument to make:
make STATIC=1
These build options exist:
e.g.: make ASAN_BUILD=1
Here are some good writeups to show how to effectively use AFL++:
If you are interested in fuzzing structured data (where you define what the structure is), these links have you covered:
If you find other good ones, please send them to us :-)
The following describes how to fuzz with a target if source code is available. If you have a binary-only target please skip to [#Instrumenting binary-only apps](#Instrumenting binary-only apps)
Fuzzing source code is a three-step process.
afl++ comes with a central compiler afl-cc
that incorporates various different kinds of compiler targets and and instrumentation options. The following evaluation flow will help you to select the best possible.
It is highly recommended to have the newest llvm version possible installed, anything below 9 is not recommended.
+--------------------------------+ | clang/clang++ 11+ is available | --> use LTO mode (afl-clang-lto/afl-clang-lto++) +--------------------------------+ see [instrumentation/README.lto.md](instrumentation/README.lto.md) | | if not, or if the target fails with LTO afl-clang-lto/++ | v +---------------------------------+ | clang/clang++ 3.3+ is available | --> use LLVM mode (afl-clang-fast/afl-clang-fast++) +---------------------------------+ see [instrumentation/README.llvm.md](instrumentation/README.llvm.md) | | if not, or if the target fails with LLVM afl-clang-fast/++ | v +--------------------------------+ | gcc 5+ is available | -> use GCC_PLUGIN mode (afl-gcc-fast/afl-g++-fast) +--------------------------------+ see [instrumentation/README.gcc_plugin.md](instrumentation/README.gcc_plugin.md) and [instrumentation/README.instrument_list.md](instrumentation/README.instrument_list.md) | | if not, or if you do not have a gcc with plugin support | v use GCC mode (afl-gcc/afl-g++) (or afl-clang/afl-clang++ for clang)
Clickable README links for the chosen compiler:
You can select the mode for the afl-cc compiler by:
MODE can be one of: LTO (afl-clang-lto*), LLVM (afl-clang-fast*), GCC_PLUGIN (afl-g*-fast) or GCC (afl-gcc/afl-g++) or CLANG(afl-clang/afl-clang++).
Because no afl specific command-line options are accepted (beside the --afl-MODE command), the compile-time tools make fairly broad use of environment variables, which can be listed with afl-cc -hh
or by reading docs/env_variables.md.
The following options are available when you instrument with LTO mode (afl-clang-fast/afl-clang-lto):
export AFL_LLVM_LAF_ALL=1
You can read more about this in instrumentation/README.laf-intel.mdinput to state
or redqueen
. If you want to use this technique, then you have to compile the target twice, once specifically with/for this mode, and pass this binary to afl-fuzz via the -c
parameter. Note that you can compile also just a cmplog binary and use that for both however there will be a performance penality. You can read more about this in instrumentation/README.cmplog.mdIf you use LTO, LLVM or GCC_PLUGIN mode (afl-clang-fast/afl-clang-lto/afl-gcc-fast) you have the option to selectively only instrument parts of the target that you are interested in:
export AFL_LLVM_ALLOWLIST=allowlist.txt
or export AFL_LLVM_DENYLIST=denylist.txt
- depending on if you want per default to instrument unless noted (DENYLIST) or not perform instrumentation unless requested (ALLOWLIST). NOTE: During optimization functions might be inlined and then would not match! See instrumentation/README.instrument_list.mdThere are many more options and modes available however these are most of the time less effective. See:
afl++ performs “never zero” counting in its bitmap. You can read more about this here:
If the target has features that make fuzzing more difficult, e.g. checksums, HMAC, etc. then modify the source code so that this is removed. This can even be done for operational source code by eliminating these checks within this specific defines:
#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION // say that the checksum or HMAC was fine - or whatever is required // to eliminate the need for the fuzzer to guess the right checksum return 0; #endif
All afl++ compilers will set this preprocessor definition automatically.
In this step the target source code is compiled so that it can be fuzzed.
Basically you have to tell the target build system that the selected afl++ compiler is used. Also - if possible - you should always configure the build system such that the target is compiled statically and not dynamically. How to do this is described below.
Then build the target. (Usually with make
)
NOTE: sometimes configure and build systems are fickle and do not like stderr output (and think this means a test failure) - which is something afl++ like to do to show statistics. It is recommended to disable them via export AFL_QUIET=1
.
For configure
build systems this is usually done by: CC=afl-clang-fast CXX=afl-clang-fast++ ./configure --disable-shared
Note that if you are using the (better) afl-clang-lto compiler you also have to set AR to llvm-ar[-VERSION] and RANLIB to llvm-ranlib[-VERSION] - as is described in instrumentation/README.lto.md.
For cmake
build systems this is usually done by: mkdir build; cmake -DCMAKE_C_COMPILERC=afl-cc -DCMAKE_CXX_COMPILER=afl-c++ ..
Note that if you are using the (better) afl-clang-lto compiler you also have to set AR to llvm-ar[-VERSION] and RANLIB to llvm-ranlib[-VERSION] - as is described in instrumentation/README.lto.md.
For meson you have to set the afl++ compiler with the very first command! CC=afl-cc CXX=afl-c++ meson
Sometimes cmake and configure do not pick up the afl++ compiler, or the ranlib/ar that is needed - because this was just not foreseen by the developer of the target. Or they have non-standard options. Figure out if there is a non-standard way to set this, otherwise set up the build normally and edit the generated build environment afterwards manually to point it to the right compiler (and/or ranlib and ar).
If you just fuzz a target program as-is you are wasting a great opportunity for much more fuzzing speed.
This requires the usage of afl-clang-lto or afl-clang-fast.
This is the so-called persistent mode
, which is much, much faster but requires that you code a source file that is specifically calling the target functions that you want to fuzz, plus a few specific afl++ functions around it. See instrumentation/README.persistent_mode.md for details.
Basically if you do not fuzz a target in persistent mode then you are just doing it for a hobby and not professionally :-)
As you fuzz the target with mutated input, having as diverse inputs for the target as possible improves the efficiency a lot.
Try to gather valid inputs for the target from wherever you can. E.g. if it is the PNG picture format try to find as many png files as possible, e.g. from reported bugs, test suites, random downloads from the internet, unit test case data - from all kind of PNG software.
If the input format is not known, you can also modify a target program to write normal data it receives and processes to a file and use these.
Use the afl++ tool afl-cmin
to remove inputs from the corpus that do not produce a new path in the target.
Put all files from step a) into one directory, e.g. INPUTS.
If the target program is to be called by fuzzing as bin/target -d INPUTFILE
the run afl-cmin like this: afl-cmin -i INPUTS -o INPUTS_UNIQUE -- bin/target -d @@
Note that the INPUTFILE argument that the target program would read from has to be set as @@
.
If the target reads from stdin instead, just omit the @@
as this is the default.
The shorter the input files that still traverse the same path within the target, the better the fuzzing will be. This is done with afl-tmin
however it is a long process as this has to be done for every file:
mkdir input cd INPUTS_UNIQUE for i in *; do afl-tmin -i "$i" -o "../input/$i" -- bin/target -d @@ done
This step can also be parallelized, e.g. with parallel
The INPUTS_UNIQUE/ directory from step b) - or even better the directory input/ if you minimized the corpus in step c) - is the resulting input corpus directory to be used in fuzzing! :-)
In this final step we fuzz the target. There are not that many important options to run the target - unless you want to use many CPU cores/threads for the fuzzing, which will make the fuzzing much more useful.
If you just use one CPU for fuzzing, then you are fuzzing just for fun and not seriously :-)
Before you do even a test run of afl-fuzz execute sudo afl-system-config
(on the host if you execute afl-fuzz in a docker container). This reconfigures the system for optimal speed - which afl-fuzz checks and bails otherwise. Set export AFL_SKIP_CPUFREQ=1
for afl-fuzz to skip this check if you cannot run afl-system-config with root privileges on the host for whatever reason.
If you have an input corpus from step 2 then specify this directory with the -i
option. Otherwise create a new directory and create a file with any content as test data in there.
If you do not want anything special, the defaults are already usually best, hence all you need is to specify the seed input directory with the result of step 2a. Collect inputs: afl-fuzz -i input -o output -- bin/target -d @@
Note that the directory specified with -o will be created if it does not exist.
If you need to stop and re-start the fuzzing, use the same command line options (or even change them by selecting a different power schedule or another mutation mode!) and switch the input directory with a dash (-
): afl-fuzz -i - -o output -- bin/target -d @@
Note that afl-fuzz enforces memory limits to prevent the system to run out of memory. By default this is 50MB for a process. If this is too little for the target (which you can usually see by afl-fuzz bailing with the message that it could not connect to the forkserver), then you can increase this with the -m
option, the value is in MB. To disable any memory limits (beware!) set -m none
- which is usually required for ASAN compiled targets.
Adding a dictionary is helpful. See the directory dictionaries/ if something is already included for your data format, and tell afl-fuzz to load that dictionary by adding -x dictionaries/FORMAT.dict
. With afl-clang-lto you have an autodictionary generation for which you need to do nothing except to use afl-clang-lto as the compiler. You also have the option to generate a dictionary yourself, see utils/libtokencap/README.md.
afl-fuzz has a variety of options that help to workaround target quirks like specific locations for the input file (-f
), not performing deterministic fuzzing (-d
) and many more. Check out afl-fuzz -h
.
afl-fuzz never stops fuzzing. To terminate afl++ simply press Control-C.
When you start afl-fuzz you will see a user interface that shows what the status is:
All labels are explained in docs/status_screen.md.
If you want to seriously fuzz then use as many cores/threads as possible to fuzz your target.
On the same machine - due to the design of how afl++ works - there is a maximum number of CPU cores/threads that are useful, use more and the overall performance degrades instead. This value depends on the target, and the limit is between 32 and 64 cores per machine.
If you have the RAM, it is highly recommended run the instances with a caching of the testcases. Depending on the average testcase size (and those found during fuzzing) and their number, a value between 50-500MB is recommended. You can set the cache size (in MB) by setting the environment variable AFL_TESTCACHE_SIZE
.
There should be one main fuzzer (-M main
option) and as many secondary fuzzers (eg -S variant1
) as you have cores that you use. Every -M/-S entry needs a unique name (that can be whatever), however the same -o output directory location has to be used for all instances.
For every secondary fuzzer there should be a variation, e.g.:
export AFL_USE_ASAN=1 ; export AFL_USE_UBSAN=1 ; export AFL_USE_CFISAN=1 ;
-M
) must be one of the them!All other secondaries should be used like this:
-L 0
fast (default), explore, coe, lin, quad, exploit, mmopt, rare, seek
which you can set with e.g. -p seek
Also it is recommended to set export AFL_IMPORT_FIRST=1
to load testcases from other fuzzers in the campaign first.
You can also use different fuzzers. If you are using afl spinoffs or afl conforming fuzzers, then just use the same -o directory and give it a unique -S
name. Examples are:
A long list can be found at https://github.com/Microsvuln/Awesome-AFL
However you can also sync afl++ with honggfuzz, libfuzzer with -entropic, etc. Just show the main fuzzer (-M) with the -F
option where the queue/work directory of a different fuzzer is, e.g. -F /src/target/honggfuzz
.
afl++ comes with the afl-whatsup
script to show the status of the fuzzing campaign.
Just supply the directory that afl-fuzz is given with the -o option and you will see a detailed status of every fuzzer in that campaign plus a summary.
To have only the summary use the -s
switch e.g.: afl-whatsup -s output/
The paths found
value is a bad indicator how good the coverage is.
A better indicator - if you use default llvm instrumentation with at least version 9 - is to use afl-showmap
with the collect coverage option -C
on the output directory:
$ afl-showmap -C -i out -o /dev/null -- ./target -params @@ ... [*] Using SHARED MEMORY FUZZING feature. [*] Target map size: 9960 [+] Processed 7849 input files. [+] Captured 4331 tuples (highest value 255, total values 67130596) in '/dev/nul l'. [+] A coverage of 4331 edges were achieved out of 9960 existing (43.48%) with 7849 input files.
It is even better to check out the exact lines of code that have been reached - and which have not been found so far.
An “easy” helper script for this is https://github.com/vanhauser-thc/afl-cov, just follow the README of that separate project.
If you see that an important area or a feature has not been covered so far then try to find an input that is able to reach that and start a new secondary in that fuzzing campaign with that seed as input, let it run for a few minutes, then terminate it. The main node will pick it up and make it available to the other secondary nodes over time. Set export AFL_NO_AFFINITY=1
if you have no free core.
Note that you in nearly all cases can never reach full coverage. A lot of functionality is usually behind options that were not activated or fuzz e.g. if you fuzz a library to convert image formats and your target is the png to tiff API then you will not touch any of the other library APIs and features.
This is a difficult question. Basically if no new path is found for a long time (e.g. for a day or a week) then you can expect that your fuzzing won't be fruitful anymore. However often this just means that you should switch out secondaries for others, e.g. custom mutator modules, sync to very different fuzzers, etc.
Keep the queue/ directory (for future fuzzings of the same or similar targets) and use them to seed other good fuzzers like libfuzzer with the -entropic switch or honggfuzz.
AFL_TMPDIR
to point the input file on a tempfs location, see docs/env_variables.md/etc/default/grub
, set GRUB_CMDLINE_LINUX_DEFAULT="ibpb=off ibrs=off kpti=off l1tf=off mds=off mitigations=off no_stf_barrier noibpb noibrs nopcid nopti nospec_store_bypass_disable nospectre_v1 nospectre_v2 pcid=off pti=off spec_store_bypass_disable=off spectre_v2=off stf_barrier=off"
; then update-grub
and reboot
(warning: makes the system more insecure)ext2
filesystem with noatime
mount option will be a bit faster than on any other journaling filesystemCheck out the docs/FAQ if it maybe answers your question (that you might not even have known you had ;-) ).
This is basically all you need to know to professionally run fuzzing campaigns. If you want to know more, the rest of this README and the tons of texts in docs/ will have you covered.
Note that there are also a lot of tools out there that help fuzzing with afl++ (some might be deprecated or unsupported):
Minimization of test cases:
Distributed execution:
Deployment, management, monitoring, reporting
Crash processing
When source code is NOT available, afl++ offers various support for fast, on-the-fly instrumentation of black-box binaries.
For linux programs and its libraries this is accomplished with a version of QEMU running in the lesser-known “user space emulation” mode. QEMU is a project separate from AFL, but you can conveniently build the feature by doing:
cd qemu_mode ./build_qemu_support.sh
For additional instructions and caveats, see qemu_mode/README.md. If possible you should use the persistent mode, see qemu_mode/README.persistent.md. The mode is approximately 2-5x slower than compile-time instrumentation, and is less conducive to parallelization.
If afl-dyninst works for your binary, then you can use afl-fuzz normally and it will have twice the speed compared to qemu_mode (but slower than persistent mode).
For non-Linux binaries you can use afl++'s unicorn mode which can emulate anything you want - for the price of speed and user written scripts. See unicorn_mode.
It can be easily built by:
cd unicorn_mode ./build_unicorn_support.sh
If the goal is to fuzz a dynamic library then there are two options available. For both you need to write a small harness that loads and calls the library. Faster is the frida solution: utils/afl_frida/README.md
Another, less precise and slower option is using ptrace with debugger interrupt instrumentation: utils/afl_untracer/README.md.
A more comprehensive description of these and other options can be found in docs/binaryonly_fuzzing.md.
Fuzzing is one of the most powerful and proven strategies for identifying security issues in real-world software; it is responsible for the vast majority of remote code execution and privilege escalation bugs found to date in security-critical software.
Unfortunately, fuzzing is also relatively shallow; blind, random mutations make it very unlikely to reach certain code paths in the tested code, leaving some vulnerabilities firmly outside the reach of this technique.
There have been numerous attempts to solve this problem. One of the early approaches - pioneered by Tavis Ormandy - is corpus distillation. The method relies on coverage signals to select a subset of interesting seeds from a massive, high-quality corpus of candidate files, and then fuzz them by traditional means. The approach works exceptionally well but requires such a corpus to be readily available. In addition, block coverage measurements provide only a very simplistic understanding of the program state and are less useful for guiding the fuzzing effort in the long haul.
Other, more sophisticated research has focused on techniques such as program flow analysis (“concolic execution”), symbolic execution, or static analysis. All these methods are extremely promising in experimental settings, but tend to suffer from reliability and performance problems in practical uses - and currently do not offer a viable alternative to “dumb” fuzzing techniques.
American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. It uses a modified form of edge coverage to effortlessly pick up subtle, local-scale changes to program control flow.
Simplifying a bit, the overall algorithm can be summed up as:
Load user-supplied initial test cases into the queue,
Take the next input file from the queue,
Attempt to trim the test case to the smallest size that doesn't alter the measured behavior of the program,
Repeatedly mutate the file using a balanced and well-researched variety of traditional fuzzing strategies,
If any of the generated mutations resulted in a new state transition recorded by the instrumentation, add mutated output as a new entry in the queue.
Go to 2.
The discovered test cases are also periodically culled to eliminate ones that have been obsoleted by newer, higher-coverage finds; and undergo several other instrumentation-driven effort minimization steps.
As a side result of the fuzzing process, the tool creates a small, self-contained corpus of interesting test cases. These are extremely useful for seeding other, labor- or resource-intensive testing regimes - for example, for stress-testing browsers, office applications, graphics suites, or closed-source tools.
The fuzzer is thoroughly tested to deliver out-of-the-box performance far superior to blind fuzzing or coverage-only tools.
To operate correctly, the fuzzer requires one or more starting file that contains a good example of the input data normally expected by the targeted application. There are two basic rules:
Keep the files small. Under 1 kB is ideal, although not strictly necessary. For a discussion of why size matters, see perf_tips.md.
Use multiple test cases only if they are functionally different from each other. There is no point in using fifty different vacation photos to fuzz an image library.
You can find many good examples of starting files in the testcases/ subdirectory that comes with this tool.
PS. If a large corpus of data is available for screening, you may want to use the afl-cmin utility to identify a subset of functionally distinct files that exercise different code paths in the target binary.
See the docs/status_screen.md file for information on how to interpret the displayed stats and monitor the health of the process. Be sure to consult this file especially if any UI elements are highlighted in red.
The fuzzing process will continue until you press Ctrl-C. At a minimum, you want to allow the fuzzer to complete one queue cycle, which may take anywhere from a couple of hours to a week or so.
There are three subdirectories created within the output directory and updated in real-time:
queue/ - test cases for every distinctive execution path, plus all the starting files given by the user. This is the synthesized corpus mentioned in section 2.
Before using this corpus for any other purposes, you can shrink it to a smaller size using the afl-cmin tool. The tool will find a smaller subset of files offering equivalent edge coverage.
crashes/ - unique test cases that cause the tested program to receive a fatal signal (e.g., SIGSEGV, SIGILL, SIGABRT). The entries are grouped by the received signal.
hangs/ - unique test cases that cause the tested program to time out. The default time limit before something is classified as a hang is the larger of 1 second and the value of the -t parameter. The value can be fine-tuned by setting AFL_HANG_TMOUT, but this is rarely necessary.
Crashes and hangs are considered “unique” if the associated execution paths involve any state transitions not seen in previously-recorded faults. If a single bug can be reached in multiple ways, there will be some count inflation early in the process, but this should quickly taper off.
The file names for crashes and hangs are correlated with the parent, non-faulting queue entries. This should help with debugging.
When you can't reproduce a crash found by afl-fuzz, the most likely cause is that you are not setting the same memory limit as used by the tool. Try:
LIMIT_MB=50 ( ulimit -Sv $[LIMIT_MB << 10]; /path/to/tested_binary ... )
Change LIMIT_MB to match the -m parameter passed to afl-fuzz. On OpenBSD, also change -Sv to -Sd.
Any existing output directory can be also used to resume aborted jobs; try:
./afl-fuzz -i- -o existing_output_dir [...etc...]
If you have gnuplot installed, you can also generate some pretty graphs for any active fuzzing task using afl-plot. For an example of how this looks like, see http://lcamtuf.coredump.cx/afl/plot/.
The coverage-based grouping of crashes usually produces a small data set that can be quickly triaged manually or with a very simple GDB or Valgrind script. Every crash is also traceable to its parent non-crashing test case in the queue, making it easier to diagnose faults.
Having said that, it's important to acknowledge that some fuzzing crashes can be difficult to quickly evaluate for exploitability without a lot of debugging and code analysis work. To assist with this task, afl-fuzz supports a very unique “crash exploration” mode enabled with the -C flag.
In this mode, the fuzzer takes one or more crashing test cases as the input and uses its feedback-driven fuzzing strategies to very quickly enumerate all code paths that can be reached in the program while keeping it in the crashing state.
Mutations that do not result in a crash are rejected; so are any changes that do not affect the execution path.
The output is a small corpus of files that can be very rapidly examined to see what degree of control the attacker has over the faulting address, or whether it is possible to get past an initial out-of-bounds read - and see what lies beneath.
Oh, one more thing: for test case minimization, give afl-tmin a try. The tool can be operated in a very simple way:
./afl-tmin -i test_case -o minimized_result -- /path/to/program [...]
The tool works with crashing and non-crashing test cases alike. In the crash mode, it will happily accept instrumented and non-instrumented binaries. In the non-crashing mode, the minimizer relies on standard afl++ instrumentation to make the file simpler without altering the execution path.
The minimizer accepts the -m, -t, -f and @@ syntax in a manner compatible with afl-fuzz.
Another tool in afl++ is the afl-analyze tool. It takes an input file, attempts to sequentially flip bytes, and observes the behavior of the tested program. It then color-codes the input based on which sections appear to be critical, and which are not; while not bulletproof, it can often offer quick insights into complex file formats. More info about its operation can be found near the end of docs/technical_details.md.
Fuzzing is a wonderful and underutilized technique for discovering non-crashing design and implementation errors, too. Quite a few interesting bugs have been found by modifying the target programs to call abort() when say:
Two bignum libraries produce different outputs when given the same fuzzer-generated input,
An image library produces different outputs when asked to decode the same input image several times in a row,
A serialization / deserialization library fails to produce stable outputs when iteratively serializing and deserializing fuzzer-supplied data,
A compression library produces an output inconsistent with the input file when asked to compress and then decompress a particular blob.
Implementing these or similar sanity checks usually takes very little time; if you are the maintainer of a particular package, you can make this code conditional with #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
(a flag also shared with libfuzzer and honggfuzz) or #ifdef __AFL_COMPILER
(this one is just for AFL).
Please keep in mind that, similarly to many other computationally-intensive tasks, fuzzing may put a strain on your hardware and on the OS. In particular:
Your CPU will run hot and will need adequate cooling. In most cases, if cooling is insufficient or stops working properly, CPU speeds will be automatically throttled. That said, especially when fuzzing on less suitable hardware (laptops, smartphones, etc), it's not entirely impossible for something to blow up.
Targeted programs may end up erratically grabbing gigabytes of memory or filling up disk space with junk files. afl++ tries to enforce basic memory limits, but can‘t prevent each and every possible mishap. The bottom line is that you shouldn’t be fuzzing on systems where the prospect of data loss is not an acceptable risk.
Fuzzing involves billions of reads and writes to the filesystem. On modern systems, this will be usually heavily cached, resulting in fairly modest “physical” I/O - but there are many factors that may alter this equation. It is your responsibility to monitor for potential trouble; with very heavy I/O, the lifespan of many HDDs and SSDs may be reduced.
A good way to monitor disk I/O on Linux is the ‘iostat’ command:
$ iostat -d 3 -x -k [...optional disk ID...]
Using the `AFL_TMPDIR` environment variable and a RAM-disk you can have the heavy writing done in RAM to prevent the aforementioned wear and tear. For example the following line will run a Docker container with all this preset: ```shell # docker run -ti --mount type=tmpfs,destination=/ramdisk -e AFL_TMPDIR=/ramdisk aflplusplus/aflplusplus ```
Here are some of the most important caveats for AFL:
afl++ detects faults by checking for the first spawned process dying due to a signal (SIGSEGV, SIGABRT, etc). Programs that install custom handlers for these signals may need to have the relevant code commented out. In the same vein, faults in child processes spawned by the fuzzed target may evade detection unless you manually add some code to catch that.
As with any other brute-force tool, the fuzzer offers limited coverage if encryption, checksums, cryptographic signatures, or compression are used to wholly wrap the actual data format to be tested.
To work around this, you can comment out the relevant checks (see utils/libpng_no_checksum/ for inspiration); if this is not possible, you can also write a postprocessor, one of the hooks of custom mutators. See docs/custom_mutators.md on how to use AFL_CUSTOM_MUTATOR_LIBRARY
There are some unfortunate trade-offs with ASAN and 64-bit binaries. This isn't due to any specific fault of afl-fuzz; see docs/notes_for_asan.md for tips.
There is no direct support for fuzzing network services, background daemons, or interactive apps that require UI interaction to work. You may need to make simple code changes to make them behave in a more traditional way. Preeny may offer a relatively simple option, too - see: https://github.com/zardus/preeny
Some useful tips for modifying network-based services can be also found at: https://www.fastly.com/blog/how-to-fuzz-server-american-fuzzy-lop
Occasionally, sentient machines rise against their creators. If this happens to you, please consult http://lcamtuf.coredump.cx/prep/.
Beyond this, see INSTALL for platform-specific tips.
Many of the improvements to the original afl and afl++ wouldn't be possible without feedback, bug reports, or patches from:
Jann Horn Hanno Boeck Felix Groebert Jakub Wilk Richard W. M. Jones Alexander Cherepanov Tom Ritter Hovik Manucharyan Sebastian Roschke Eberhard Mattes Padraig Brady Ben Laurie @dronesec Luca Barbato Tobias Ospelt Thomas Jarosch Martin Carpenter Mudge Zatko Joe Zbiciak Ryan Govostes Michael Rash William Robinet Jonathan Gray Filipe Cabecinhas Nico Weber Jodie Cunningham Andrew Griffiths Parker Thompson Jonathan Neuschaefer Tyler Nighswander Ben Nagy Samir Aguiar Aidan Thornton Aleksandar Nikolich Sam Hakim Laszlo Szekeres David A. Wheeler Turo Lamminen Andreas Stieger Richard Godbee Louis Dassy teor2345 Alex Moneger Dmitry Vyukov Keegan McAllister Kostya Serebryany Richo Healey Martijn Bogaard rc0r Jonathan Foote Christian Holler Dominique Pelle Jacek Wielemborek Leo Barnes Jeremy Barnes Jeff Trull Guillaume Endignoux ilovezfs Daniel Godas-Lopez Franjo Ivancic Austin Seipp Daniel Komaromy Daniel Binderman Jonathan Metzman Vegard Nossum Jan Kneschke Kurt Roeckx Marcel Boehme Van-Thuan Pham Abhik Roychoudhury Joshua J. Drake Toby Hutton Rene Freingruber Sergey Davidoff Sami Liedes Craig Young Andrzej Jackowski Daniel Hodson Nathan Voss Dominik Maier Andrea Biondo Vincent Le Garrec Khaled Yakdan Kuang-che Wu Josephine Calliotte Konrad Welc Thomas Rooijakkers David Carlier Ruben ten Hove Joey Jiao
Thank you! (For people sending pull requests - please add yourself to this list :-)
If you use AFLplusplus in scientific work, consider citing our paper presented at WOOT'20:
@inproceedings {AFLplusplus-Woot20, author = {Andrea Fioraldi and Dominik Maier and Heiko Ei{\ss}feldt and Marc Heuse}, title = {{AFL++}: Combining Incremental Steps of Fuzzing Research}, booktitle = {14th {USENIX} Workshop on Offensive Technologies ({WOOT} 20)}, year = {2020}, publisher = {{USENIX} Association}, month = aug, }
Questions? Concerns? Bug reports? The contributors can be reached via https://github.com/AFLplusplus/AFLplusplus
There is also a mailing list for the afl/afl++ project; to join, send a mail to afl-users+subscribe@googlegroups.com. Or, if you prefer to browse archives first, try: https://groups.google.com/group/afl-users