-
Fuzzing closed source applications using
#WinAFL by@HackSysTeam@bsidesdelhipic.twitter.com/PJQGwRIrS5
Prikaži ovu nit -
Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing https://www.apriorit.com/dev-blog/640-qa-fuzzing-for-closed-source-windows-software …
#winafl#fuzzing#vulnerability -
Hack the Hacker - Fuzzing mimikatz with WinAFL&Heatmaps (0day) https://www.sec-consult.com/en/blog/2017/09/hack-the-hacker-fuzzing-mimikatz-on-windows-with-winafl-heatmaps-0day/index.html …
#mimikatz#WinAFL#AFL#fuzzing#pentesting#0daypic.twitter.com/SXRHSPpZSQ
-
Here is how I found several CVEs with
#WinAFL https://www.apriorit.com/dev-blog/640-qa-fuzzing-for-closed-source-windows-software … -
Qt Gif parsing null deref rediscovered with
#WinAFL https://tw1st.link/2019/12/20/qt-gif-fuzzing … -
-
Some bugs I've discovered recently with
#WinAFL. It's in 3rd party image viewer on windows: ACDSsee, XnView, FastStone and I IrfanView. There are 20+ CVEids but It seems it's not so simple to build least one exploit on top of it https://github.com/apriorit/pentesting/blob/master/bugs/CVEs.md … -
A bit more info about fuzzing 3rd party image viewers for Windows
#WinAFL#fuzzing#CVEhttps://www.apriorit.com/dev-blog/644-reverse-vulnerabilities-software-no-code-dynamic-fuzzing … -
A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU https://github.com/andreafioraldi/WineAFLplusplusDEMO …
#winafl#win32fuzzing#fuzzing#AFL -
So tried intel PT mode with
#winafl, and for me its very slow! dynamorio is much much better. -
Fuzzing the MSXML6 library with WinAFL
#Fuzzing#Winafl https://symeonp.github.io/2017/09/17/fuzzing-winafl.html … -
16h to put
#Winafl working -
added option to AFL_Runner.py to first run winafl with drrun.exe in debug mode to generate log. https://github.com/hardik05/python/blob/master/AFL_Runner.py …
#winafl#fuzzingPrikaži ovu nit -
Extracting a 19 Year Old Code Execution from #WinRAR -> https://research.checkpoint.com/extracting-code-execution-from-winrar/ …
In this article, we tell the story of how we found a logical bug using the #WinAFL fuzzer and exploited it in#WinRAR to gain full control over a victim’s computer. pic.twitter.com/HSIGurCJ2nPrikaži ovu nit -
My first DLL reversing, writing harness for
#winafl, wish me some crashes#FUZZING#BugBounty#afl -
Great research work relying on
#WinAFL fuzzer. https://twitter.com/_CPResearch_/status/1072870721989226496 … -
Extracting a 19 Year Old Code Execution from WinRAR - Check Point Research https://research.checkpoint.com/extracting-code-execution-from-winrar/ …
#WinRAR#WinAFL -
Using LoadLibrary() with
#WinAFL drops exec speed to 16 exec/sec. Any ideas to enhance the performance? -
The hardest part in fuzzing with
#winafl is writing a harness. Rest win AFL will take care
-
Someone add this to
#WinAFL https://twitter.com/revskills/status/911368292815835136 …Tweet je nedostupan.
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.