ZigBee Fuzzer (zfuzz) is a tool for discovering implementation errors of 802.15.4-enabled devices by using smart and stateful fuzzing techniques. The fuzzing engine automatically generates possible vulnerable inputs regarding the 802.15.4 protocol specification to find unknown vulnerabilities in the 802.15.4 stack of target devices.
To begin zfuzz, click Blackbox Testing in the main page of IoTcube, then proceed by clicking Wireless Testing.

On the following page, download zfuzz, which is a zip containing the main fuzzer.
Linux (32 and 64 bit) is supported at the moment.

Please unzip the package "zfuzz.zip" downloaded in the previous step with your own unarchiving tool.

After unzipping the package, you will have a file for the fuzzing.
Open terminal and go to the zfuzz directory.

Then run zfuzz with sudo command.

If you want to start in scan mode, you can do so by entering the -s option at the beginning of the program.
Select a ZigBee dingle you've connected and select a target device after scanning (if you are in scan mode).



Or input your known-device's information.

Then it automatically starts! If you want to stop the fuzzing process, press Ctrl + C
Find the log_{data}.wfl file created in the same directory as the fuzzing program and upload it to IoTcube.
