IoTcube Logo
IoTcube

Security Platform

User Guide : Blackbox-testing pfuzz

INTRODUCTION

Vulnerable file(PoC) aided mutational file fuzzer(Pfuzz) is a vulnerability-guided directed fuzzer for bug discovery. Fuzzing executions are guided to vulnerable paths using known paths acquired by buggy files. It uses any type of input for testing a binary but prefers buggy files that produce any crash. It automatically tests inputs (dry-run) provided by users to check whether they produce a crash, and they are called buggy files. The pfuzz prioritizes the buggy inputs to generate test cases and they are evolved by checking highly frequent bytes that are flipped when producing crashes.

USAGE

Step 1. Getting Started

To begin pfuzz, click Blackbox Testing in the main page of IoTcube, then proceed by clicking Binary Testing.

Step 1. Getting Started

Step 2. Downloading pfuzz

In the following page, download pfuzz, which is a zip containing main program.

Linux (64 bit) is supported at the moment.

Step 2. Downloading pfuzz

Step 3. Unarchiving Package

Please unzip the package "pfuzz.zip" downloaded in the previous step with your own unarchiving tool.

Step 3. Unarchiving Package
  • pfuzz-jpg.sh: You can launch a fuzzing process of binary with input <strong>jpg</strong> by executing this program.
  • pfuzz-pdf.sh: You can launch a fuzzing process of binary with input <strong>pdf</strong> by executing this program.
  • pfuzz-gif.sh: You can launch a fuzzing process of binary with input <strong>gif</strong> by executing this program.
  • The other files: There are several other files related to pfuzz.

After unzipping the package, you will have several files for pfuzz.

Step 4. Running Program

Open terminal and go to pfuzz directory.

Step 4. Running Program

Then run pfuzz. You have to specify a target binary by writing path next to the command.

Additional content 1

Step 5. Waiting For Fuzzing And Stopping

As the application runs,

You can allow it to run for as much time as you want.

If you want to stop the fuzzing process, press Ctrl + C

Step 5. Waiting For Fuzzing And Stopping

Step 6. Uploading Your Log

Find the bundle.zip file created in the output path (/pfuzz/output_[target_binary]/) and upload it to IoTcube!

Step 6. Uploading Your Log

POSSIBLE COLLABORATION

For inquiries, suggestions or possible collaboration please send an email to cssa@korea.ac.kr.