-
SG Input software security analysis fuzz
#offensivesecurity#cybersecurity#reverseengineering#vulnerability#windows#exploitdevelopment#softwaresecurity#winafl#fuzzing https://lnkd.in/eCxtiWc -
Qt Gif parsing null deref rediscovered with
#WinAFL https://tw1st.link/2019/12/20/qt-gif-fuzzing … -
Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing https://www.apriorit.com/dev-blog/640-qa-fuzzing-for-closed-source-windows-software …
#winafl#fuzzing#vulnerability -
So tried intel PT mode with
#winafl, and for me its very slow! dynamorio is much much better. -
-
A bit more info about fuzzing 3rd party image viewers for Windows
#WinAFL#fuzzing#CVEhttps://www.apriorit.com/dev-blog/644-reverse-vulnerabilities-software-no-code-dynamic-fuzzing … -
Fuzzing closed source applications using
#WinAFL by@HackSysTeam@bsidesdelhipic.twitter.com/PJQGwRIrS5
Prikaži ovu nit -
Here is how I found several CVEs with
#WinAFL https://www.apriorit.com/dev-blog/640-qa-fuzzing-for-closed-source-windows-software … -
A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU https://github.com/andreafioraldi/WineAFLplusplusDEMO …
#winafl#win32fuzzing#fuzzing#AFL -
Some bugs I've discovered recently with
#WinAFL. It's in 3rd party image viewer on windows: ACDSsee, XnView, FastStone and I IrfanView. There are 20+ CVEids but It seems it's not so simple to build least one exploit on top of it https://github.com/apriorit/pentesting/blob/master/bugs/CVEs.md … -
"RT RT hardik05: added option to AFL_Runner.py to first run winafl with drrun.exe in debug mode to generate log. https://github.com/hardik05/python/blob/master/AFL_Runner.py …
#winafl#fuzzing" -
added option to AFL_Runner.py to first run winafl with drrun.exe in debug mode to generate log. https://github.com/hardik05/python/blob/master/AFL_Runner.py …
#winafl#fuzzingPrikaži ovu nit -
Releasing a quick and dirty script i coded, afl_runner.py . winafl takes lot of arguments and a user might make some mistake in passing parameters. with this script, you can configure different parameter once and then run it when you want. https://github.com/hardik05/python/blob/master/AFL_Runner.py …
#winafl#fuzzing -
-
The hardest part in fuzzing with
#winafl is writing a harness. Rest win AFL will take care
-
Check Point Software Technologies: bug all'interno di WinRAR da 19 anni! - https://is.gd/ZfDikN
#socialandtech#technews#bug#winrar#19anni#fuzztestingWinAFL#WinAFL#CheckPointSoftwareTechnologiespic.twitter.com/1V8NJF42V0
-
Extracting a 19 Year Old Code Execution from WinRAR - Check Point Research https://research.checkpoint.com/extracting-code-execution-from-winrar/ …
#WinRAR#WinAFL -
Extracting a 19 Year Old Code Execution from #WinRAR -> https://research.checkpoint.com/extracting-code-execution-from-winrar/ …
In this article, we tell the story of how we found a logical bug using the #WinAFL fuzzer and exploited it in#WinRAR to gain full control over a victim’s computer.pic.twitter.com/HSIGurCJ2nPrikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.