IoTcube Logo
IoTcube

Security Platform

User Guide : Blackbox-testing bfuzz

INTRODUCTION

Bluetooth Fuzzer (bfuzz) is a tool for discovering implementation errors of Bluetooth BR/EDR (BT Classis) devices by using smart and stateful fuzzing techniques. The fuzzing engine automatically generates possible vulnerable inputs regarding 4 kinds of Bluetooth core protocol specification (L2CAP, OBEX, RFCOMM, SDP) to find known/unknown vulnerabilities in the Bluetooth host stack of target devices.

USAGE

Requirements

  • <strong>A bluetooth dongle</strong> connected to the host machine
  • <strong>BlueZ</strong> library (Native built in Linux)
  • <strong>Ubuntu 16.04 or 18.04 recommended</strong>

Step 1. Getting Started

To begin bfuzz, click Blackbox Testing in the main page of IoTcube, then proceed by clicking Wireless Testing.

Step 1. Getting Started

Step 2. Downloading bfuzz

On the following page, download bfuzz, which is a zip containing the fuzzer and packet database.

Linux (32 and 64 bit) is supported at the moment.

Step 2. Downloading bfuzz

Step 3. Unarchiving Package

Extract "bfuzz.zip" from the previous step.

Step 3. Unarchiving Package
  • config_bfuzz.sh: Configuration script for bfuzz. Must be run with <strong>root priviledge (sudo)</strong> before bfuzz(only once).
  • bfuzz: You can launch a fuzzing process by executing this program. bfuzz must be run with <strong>root priviledge (sudo)</strong>
  • data.db: It stores packets for the smart &amp; stateful fuzzing.

After extracting the package, you will have several files for the fuzzer.

Step 4. Running Program

Open terminal, go to the bfuzz directory and run config_bfuzz.sh with sudo command(only once).

Step 4. Running Program

Then run bfuzz with sudo command.

Additional content 1

Step 5. Selecting A Target Device and A Protocol

Select any device found via scanning nearby.

Step 5. Selecting A Target Device and A Protocol

Select a any profile of the target device.

Additional content 1

Select a protocol to launch fuzzing. Then it automatically starts! If you want to stop the fuzzing process, press Ctrl + C

Additional content 2

Step 6. Uploading Your Log

Find the log.wfl file created in the same directory as the fuzzing program and upload it to IoTcube.

Step 6. Uploading Your Log

POSSIBLE COLLABORATION

For inquiries, suggestions or possible collaboration please send an email to cssa@korea.ac.kr.