Change "AFL" to "AFL++"

This commit is contained in:
llzmb
2021-12-02 19:52:10 +01:00
parent 3023a36d4d
commit b7395fa467
13 changed files with 33 additions and 29 deletions

View File

@ -1,6 +1,6 @@
# argvfuzz
AFL supports fuzzing file inputs or stdin. When source is available,
AFL++ supports fuzzing file inputs or stdin. When source is available,
`argv-fuzz-inl.h` can be used to change `main()` to build argv from stdin.
`argvfuzz` tries to provide the same functionality for binaries. When loaded
@ -13,4 +13,4 @@ A few conditions need to be fulfilled for this mechanism to work correctly:
2. If the target binary does not use the default libc's `_start` implementation
(crt1.o), the hook may not run.
3. The hook will replace argv with pointers to `.data` of `argvfuzz.so`. If the
target binary expects argv to be living on the stack, things may go wrong.
target binary expects argv to be living on the stack, things may go wrong.

View File

@ -28,7 +28,7 @@ heap-related security bugs in several ways:
- Optionally, in platforms supporting it, huge pages can be used by passing
USEHUGEPAGE=1 to make.
- Size alignment to `max_align_t` can be enforced with AFL_ALIGNED_ALLOC=1.
In this case, a tail canary is inserted in the padding bytes at the end
of the allocated zone. This reduce the ability of libdislocator to detect
@ -49,7 +49,7 @@ The allocator is slow and memory-intensive (even the tiniest allocation uses up
for "production" uses; but it can be faster and more hassle-free than ASAN / MSAN
when fuzzing small, self-contained binaries.
To use this library, run AFL like so:
To use this library, run AFL++ like so:
```
AFL_PRELOAD=/path/to/libdislocator.so ./afl-fuzz [...other params...]
@ -62,7 +62,7 @@ Similarly to afl-tmin, the library is not "proprietary" and can be used with
other fuzzers or testing tools without the need for any code tweaks. It does not
require AFL-instrumented binaries to work.
Note that the AFL_PRELOAD approach (which AFL internally maps to LD_PRELOAD or
Note that the AFL_PRELOAD approach (which AFL++ internally maps to LD_PRELOAD or
DYLD_INSERT_LIBRARIES, depending on the OS) works only if the target binary is
dynamically linked. Otherwise, attempting to use the library will have no
effect.
effect.

View File

@ -43,7 +43,7 @@ when using afl-gcc. This setting specifically adds the following flags:
The next step is to load this library via LD_PRELOAD. The optimal usage pattern
is to allow afl-fuzz to fuzz normally for a while and build up a corpus, and
then fire off the target binary, with libtokencap.so loaded, on every file found
by AFL in that earlier run. This demonstrates the basic principle:
by AFL++ in that earlier run. This demonstrates the basic principle:
```
export AFL_TOKEN_FILE=$PWD/temp_output.txt