Merge pull request #1588 from anfedotoff/dev

Add CASR as third party tool in docs.
This commit is contained in:
van Hauser 2022-11-21 13:24:33 +01:00 committed by GitHub
commit 6655d66a9b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 28 additions and 0 deletions

View File

@ -900,6 +900,32 @@ then color-codes the input based on which sections appear to be critical and
which are not; while not bulletproof, it can often offer quick insights into
complex file formats.
`casr-afl` from [CASR](https://github.com/ispras/casr) tools provides a
straightforward CASR integration with AFL++. While walking through afl
instances, `casr-afl` generates crash reports depending on target binary. For
binary with ASAN `casr-san` is used, otherwise `casr-gdb`. On the next step
report deduplication is done by `casr-cluster`. Finally, reports are triaged
into clusters. Crash reports contain many useful information: severity
(like [exploitable](https://github.com/jfoote/exploitable)), OS and package
versions, command line, stack trace, register values, disassembly, and even
source code fragment where crash appeared.
**NOTE:** `casr-gdb` and `casr-san` should be in PATH to make `casr-afl` work.
Before using casr-afl, please, follow the installation
[guide](https://github.com/ispras/casr#getting-started). Using `casr-afl` is
very simple:
```shell
casr-afl -i /path/to/afl/out/dir -o /path/to/casr/out/dir
```
Output directory contains subdirectories (cl1...clN) with report clusters. To
view reports you could use `casr-cli` tool:
```shell
casr-cli /path/to/casr/out/dir/cl1/report.casrep
```
## 5. CI fuzzing
Some notes on continuous integration (CI) fuzzing - this fuzzing is different to

View File

@ -62,3 +62,5 @@
generates builds of debian packages suitable for AFL.
* [afl-fid](https://github.com/FoRTE-Research/afl-fid) - a set of tools for
working with input data.
* [CASR](https://github.com/ispras/casr) - a set of tools for crash triage and
analysis.