• Stars
    star
    131
  • Rank 275,867 (Top 6 %)
  • Language
    C
  • License
    MIT License
  • Created over 2 years ago
  • Updated 2 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

A de-socketing library for fuzzing.

De-socketing for Fuzzing

When fuzzing network applications the fuzzers provide their inputs over stdin although the applications expect their input over network connections. This library redirects all network communication to stdin and stdout such that network applications can be traditionally fuzzed with AFL++.

This has the advantage of

  1. Improving performance by reducing kernel interactions because libdesock operates 100% in user-space
  2. Reducing the amount of manual effort necessary to create a harness

For an in-depth explanation of de-socketing see our blog post.

Building

Libdesock uses meson and ninja as its build system.

meson setup ./build
cd ./build

You can configure the build using

meson configure -D <optname>=<optvalue>

You can get an overview over all options with

meson configure

The following options are specific to libdesock:

Option Description Default
arch The CPU architecture for which you are compiling libdesock.so x86_64
debug_desock If this is true, calls to functions in libdesock.so get logged to stderr. false
desock_client If this is true, calls to connect() get hooked. This enables the desocketing of clients. false
desock_server If this is true, calls to bind() get hooked. This enables the desocketing of servers. true
fd_table_size Only fds < fd_table_size can be desocked. 128
interpreter Path to ld.so (will be determined dynamically if not set)

If configuration is done compile with

meson compile

This creates a shared library ./build/libdesock.so and a static library ./build/libdesock.a.

Usage

Prepend

LD_PRELOAD=libdesock.so

to the invocation of any network application or set the environment variable

AFL_PRELOAD=libdesock.so

when using AFL++.

Examples

If you are using libdesock and AFL for fuzzing, the programs under test usually require a special setup to work with AFL. Checkout our examples directory for some examples on how to properly setup network applications for fuzzing.

Known Bugs

  • TCP servers using libuv cannot be de-socket-ed (yet). De-socketing of libuv currently only works with UDP servers. It only takes a small change to fix this though, if anyone needs this create an issue.
  • ioctl() is not supported. Make sure your target does not rely on ioctl requests

Copyright Notice

Libdesock is based upon musl libc and parts of the musl source code can be found in libdesock.

More Repositories

1

awesome-embedded-and-iot-security

A curated list of awesome embedded and IoT security resources.
1,395
star
2

FACT_core

Firmware Analysis and Comparison Tool
Python
1,230
star
3

cwe_checker

cwe_checker finds vulnerable patterns in binary executables
Rust
1,088
star
4

friTap

The goal of this project is to help researchers to analyze traffic encapsulated in SSL or TLS.
JavaScript
257
star
5

dewolf

A research decompiler implemented as a Binary Ninja plugin.
Python
171
star
6

nvd-json-data-feeds

Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endorsed nor certified by the NVD.
Shell
109
star
7

RoAMer

Robust Automated Malware Unpacker
Python
84
star
8

fact_extractor

Standalone Utility for FACT-like extraction
Python
80
star
9

LuckyCAT

A distributed fuzzing management framework
Python
63
star
10

iva

IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
Python
60
star
11

DeStroid

Fighting String Encryption in Android Malware
Python
53
star
12

butterfly

LibAFL components for stateful fuzzing
Rust
42
star
13

yapscan

Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.
Go
40
star
14

bountyhunter

A Caldera plugin for the emulation of complete, realistic cyberattack chains.
Python
40
star
15

socbed

A Self-Contained Open-Source Cyberattack Experimentation Testbed
Python
35
star
16

pcapFS

A FUSE module to mount captured network data
C++
32
star
17

Logprep

log data pre processing, generation and shipping in python
Python
30
star
18

embedded-evaluation-corpus

firmware evaluation reference corpus
22
star
19

wattson

A co-simulation framework for reasearching cybersecurity in power grids.
Python
19
star
20

ipal_transcriber

Industrial protocol transcriber - a common representation of industrial communication as input for protocol-independent industrial intrusion detection systems.
Python
19
star
21

ipal_ids_framework

Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.
Python
19
star
22

FACT_docker

Dockerfile for building the FACT container
Python
18
star
23

ipal_datasets

Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.
Python
14
star
24

FACT_analysis-plugin_CVE-lookup

FACT analysis plug-in that maps software version to cves
Python
13
star
25

headerParser

Header information parser for PE, ELF, DEX, MachO, ZIP (JAR, DocX).
C
13
star
26

blackbox-opcua-fuzzing

Python
9
star
27

Codescanner

Python
9
star
28

png-carving

PNG file carving related material
C++
8
star
29

mcritweb

JavaScript
7
star
30

bidcos-security-doc

A documentation of the Bidcos (homematic) radio protocol with focus on practical security aspects
Python
7
star
31

FACT_firmadyne_analysis_plugin

Integrates Firmadyne into FACT
Python
7
star
32

61850-fuzzing

This repository provides fuzzing scripts to analyze an IEC 61850 implementation
Python
6
star
33

woodblock

A framework to generate file carving test data.
Python
6
star
34

eeva

E²VA short for Exploitation Experience with Vulnerable App is a vulnerable app to learn userspace exploitation on Android
Java
6
star
35

common_analysis_oms

Offline Malware Scanner (OMS) scans files with multiple locally installed malware scanners.
Python
6
star
36

dewolf-logic

A graph-based logic engine for bitwise operations.
Python
5
star
37

fact_pdf_report

FACT PDF Report Generator
Python
4
star
38

maritime-dissector

A lua plugin for Wireshark which contains dissectors for common maritime protocols.
Lua
4
star
39

common_analysis_ip_and_uri

Detects IPv4 and IPv6 adresses as well as URIs
Python
4
star
40

Algorithmic-Heap-Layout-Manipulation-in-the-Linux-Kernel

Our artifacts to our Paper: "Algorithmic Heap Layout Manipulation in the Linux Kernel"
C
4
star
41

bpf-rootkit-workshop

Workshop: Forensic Analysis of eBPF based Linux Rootkits
C
4
star
42

bpmac

C
3
star
43

talk

NtDeviceIoControlFile talker
C
3
star
44

windowsScripts

A collection of some useful windows (batch) scripts.
Batchfile
3
star
45

common_helper_extraction

Extraction support functions
Python
3
star
46

cve-attribution-s2

Companion Repository to our the whitepaper "Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses": https://arxiv.org/abs/2209.05217
Python
3
star
47

fact_helper_file

File type helper functions and magic library
Python
3
star
48

entropython

Efficient calculation of shannon byte entropy based on rust library.
Rust
3
star
49

docker_qemu_user

Phusion-based docker image containing the binaries for Qemu User Emulation
Shell
2
star
50

epf-parameter-screening

Shell
2
star
51

pidarci

PIdARCI Prototype Implementation
Python
2
star
52

FACT_analysis_plugin_template

Download this template if you want to write your own FACT analysis plug-in
Python
2
star
53

FACT_Search_and_Download

This tool is intended to create a ground truth matching specific parameters for scientific research on firmware.
Python
2
star
54

common_helper_files

Python
2
star
55

common_helper_yara

Yara command line wrapper
Python
2
star
56

bamboo-chuck-norris-plugin

2
star
57

ELFbin

C
2
star
58

hexter

A minimal terminal hex viewer supporting reading, writing and searching in files and processes.
C
2
star
59

docker_ghidra_headless_base

base docker image for ghidra headless scripting
Dockerfile
2
star
60

ssdeeper

Supplemental material for our paper: ssdeeper - Evaluating and Improving ssdeep.
Shell
1
star
61

common_helper_filter

generate nice structured output
Python
1
star
62

cwe_checker_travis_docker_image

Docker image with current BAP (opam testing) and other dependencies for fast testing of cwe_checker on travis
Dockerfile
1
star
63

mana

Python
1
star
64

FACT_remote_plugin_runner

Base class for FACT remote analysis systems
1
star
65

epf-case-study

C
1
star
66

fact_radare_viewer

Start radare webUI via REST in container and deliver url to view
Python
1
star
67

socbed-eval-acsac-2021

SOCBED evaluation code and dataset as presented at ACSAC 2021
Python
1
star
68

ei2f

C++
1
star
69

common_helper_unpacking_classifier

Try to guess if unpacking a container was successfull.
Python
1
star
70

docker-radare-web-gui

Dockerfile for Radare2 web gui
Shell
1
star
71

dewolf-idioms

A new approach for compiler idioms handling that automatically generates patterns to annotate them.
Python
1
star
72

conpot-plus

Python
1
star
73

frida-emulator-bypass

1
star
74

common_helper_passwords

Helper functions for handling password lists and files.
Python
1
star
75

Web-Content-Integrity

Web Content Integrity: Tamper-proof websites beyond HTTPS
HTML
1
star
76

spmac

Python
1
star
77

common_helper_process

fail-safe process helpers
Python
1
star
78

powerowl

PowerOwl models power grids as a whole and allows to simulate their power-domain behavior.
Python
1
star
79

winDbgFixPte

Fixes WinDbg !pte command not working bug
C
1
star
80

DEXSLib

Currently, the project is being heavily refactored and is therefore in an unusable state. Android RE library for static forward and backward slicing
Java
1
star
81

fact_goblin_bindings

Goblin bindings for parsing ELF header information in FACT
Rust
1
star
82

linux-firmware-corpus

HTML
1
star