tree: d5facf9991625b8fab2f5a2e740bc3489f4db506 [path history] [tgz]
  1. honggfuzz_socketclient.py
  2. Makefile
  3. README.md
  4. unittest.sh
  5. vulnserver_cov.c
socketfuzzer/README.md

Honggfuzz - SocketClient

Implement an external fuzzer to fuzz network servers or similar.

Tested on Ubuntu 17.04.

Protocol

Simple:

HonggFuzz      <->       FFW
             "Fuzz" -->
         <-- "Okay"
             "New!" -->
             "Cras" -->
         <-- "bad!"
  • “Fuzz”: HongFuzz tells FFW to send its network messages to the target server
  • “Okay”: FFW tells HonggFuzz that it is finished sending the messages
  • “New!”: HonggFuzz tells FFW that new basic blocks have been reached
  • “Cras”: HonggFuzz tells FFW that the target has crashed
  • “bad!”: FFW tells Honggfuzz that the server is crashed

Overview

vulnserver_cov will listen to localhost:5001 and expect messages starting with “A”, “B”, “C”, “D” or “E”. Message “B” can provoke a stack based buffer overflow, while message “C” can provoke a heap based buffer overflow.

The current honggfuzz_socketclient will send one of these messages (decided by the user), after honggfuzz told it that it is ready (the client process is started). Number 0-4 correspond to “A”-“E”, while number 5 and 6 will provoke memory corruption overflows.

honggfuzz_socketclient will then proceed to send the messages to vulnserver_cov on port 5001. After that hongfuzz may send a message to hongfuzz_client, indicating that new basic blocks have been reached.

Preparation

Compile the test server, with make or:

~/honggfuzz/hfuzz_cc/hfuzz-gcc vulnserver_cov.c -O0 -o vulnserver_cov

How-to

Start hongfuzz in socket-client mode:

$ cd ~/honggfuzz
$ mkdir test
$ cd test
$ ../honggfuzz --keep_output --debug --sanitizers --sancov --stdin_input --threads 1 --verbose --logfile log.txt --socket_fuzzer -- ../socketfuzzer/vulnserver_cov
Waiting for SocketFuzzer connection on socket: /tmp/honggfuzz_socket.<pid>

In another terminal, start the socketfuzzer client:

$ python ./honggfuzz_socketclient.py interactive
connecting to /tmp/honggfuzz_socket
--[ Send Msg #: 1
Send to target: 1
--[ R Adding file to corpus...
--[ Send Msg #: 5
Send to target: 5
--[ R Target crashed
--[ Send Msg #: 1
Send to target: 1
--[ Send Msg #: 5
Send to target: 5
--[ Send Msg #: 1
Send to target: 1
--[ Send Msg #: 5
Send to target: 5
--[ Send Msg #: 2
Send to target: 2
--[ R Adding file to corpus...
--[ Send Msg #: 3
Send to target: 3
--[ R Adding file to corpus...
--[ Send Msg #: 5
Send to target: 5

Automatic test, successful run:

$ ./unittest.sh
Auto
connecting to /tmp/honggfuzz_socket

Test: 0 - initial
  ok: Fuzz

Test: 1 - first new BB
  ok: New!
  ok: Fuzz

Test: 2 - second new BB
  ok: New!
  ok: Fuzz

Test: 3 - repeat second msg, no new BB
  ok: Fuzz

Test: 4 - crash stack
  ok: Cras
  ok: Fuzz

Test: 5 - resend second, no new BB
  ok: Fuzz

Test: 6 - send three, new BB
  ok: New!
  ok: Fuzz

Test: 7 - send four, new BB
  ok: New!
  ok: Fuzz

Test: 8 - send four again, no new BB
  ok: Fuzz