Giter VIP home page Giter VIP logo

afl_ghidra_emu's Introduction

afl_ghidra_emu

License

afl_ghidra_emu allows to fuzz exotic architecture using AFL++ and Ghidra emulation with code coverage functionality.

For more information, read this article.

How it works?

AFL++ runs a trampoline program (afl_bridge_external) which is in charge of forwarding samples to Ghidra emulation via a TCP socket (Ex: 127.0.0.1:6674/tcp).

A python script in Ghidra (fuzz_xtensa_check_serial.py) is responsible for emulating code execution. It listens on a TCP socket (127.0.0.1:6674/tcp) and waits for input data coming from trampoline script. As soon as the script receives input data, the emulation will be started. During the execution, the executed path addresses, and the execution status are sent to afl_bridge_external using established TCP socket.

afl_bridge_external reports the execution status and execution path to AFL++ using pipes and shared memory.

Installation

Install AFL++

Clone afl_ghidra_emu directory

git clone https://github.com/airbus-cyber/afl_ghidra_emu.git

Compile afl_bridge_external

cd afl_ghidra_emu/afl_bridge_external
make

Copy afl_ghidra_emu files to your ghidra script directory

cd ../..
cp โ€“r afl_ghidra_emu/* $USER_HOME/ghidra_scripts/

Example: Fuzzing Xtensa binary code keygenme_xtensa.elf

./examples/xtensa/bin/keygenme_xtensa.elf is a keygenMe compiled for Xtensa (ex: esp32) architecture. Xtensa is not officially supported in Ghidra yet. So, you need first to install it by following these instruction

Load in Ghidra

  • Create a new project in Ghidra;
  • Import file ./bin/keygenme_xtensa.elf (arch: Xtensa:LE:32);
  • Open it in CodeBrowser and execute auto-analyze;
  • Open Script Manager in "Window" submenu;
  • Run script fuzz_xtensa_check_serial.py;

Start Fuzz

Make AFL workspace directories

mkdir input output

Add first sample

echo -n "BBBBBBBB" > input/sample1.bin

Start AFL++ with trampoline program.

afl-fuzz -D -i input -o output afl_bridge_external 127.0.0.1 6674 20

Stop Ghidra emulation

Stop AFL++ using CTRL+C. If Ghidra emulation still running, we can send "STOP" command:

echo -e "\xff" | nc 127.0.0.1 6674

Do no use Ghidra Cancel button, because it does not properly close the socket.

Example: Fuzzing PPC binary code keygenme_ppc.elf

./examples/ppc/bin/keygenme_ppc.elf is also a keygenMe compiled for PowerPC architecture.

Follow the same steps above with PowerPC:BE:32:default architecture in Ghidra and run the script fuzz_ppc_check_serial.py.

afl_ghidra_emu's People

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.