mirror of
https://github.com/AFLplusplus/AFLplusplus.git
synced 2025-06-17 04:18:06 +00:00
Change "AFL" to "AFL++"
This commit is contained in:
@ -1,6 +1,6 @@
|
||||
# argvfuzz
|
||||
|
||||
AFL supports fuzzing file inputs or stdin. When source is available,
|
||||
AFL++ supports fuzzing file inputs or stdin. When source is available,
|
||||
`argv-fuzz-inl.h` can be used to change `main()` to build argv from stdin.
|
||||
|
||||
`argvfuzz` tries to provide the same functionality for binaries. When loaded
|
||||
@ -13,4 +13,4 @@ A few conditions need to be fulfilled for this mechanism to work correctly:
|
||||
2. If the target binary does not use the default libc's `_start` implementation
|
||||
(crt1.o), the hook may not run.
|
||||
3. The hook will replace argv with pointers to `.data` of `argvfuzz.so`. If the
|
||||
target binary expects argv to be living on the stack, things may go wrong.
|
||||
target binary expects argv to be living on the stack, things may go wrong.
|
@ -28,7 +28,7 @@ heap-related security bugs in several ways:
|
||||
|
||||
- Optionally, in platforms supporting it, huge pages can be used by passing
|
||||
USEHUGEPAGE=1 to make.
|
||||
|
||||
|
||||
- Size alignment to `max_align_t` can be enforced with AFL_ALIGNED_ALLOC=1.
|
||||
In this case, a tail canary is inserted in the padding bytes at the end
|
||||
of the allocated zone. This reduce the ability of libdislocator to detect
|
||||
@ -49,7 +49,7 @@ The allocator is slow and memory-intensive (even the tiniest allocation uses up
|
||||
for "production" uses; but it can be faster and more hassle-free than ASAN / MSAN
|
||||
when fuzzing small, self-contained binaries.
|
||||
|
||||
To use this library, run AFL like so:
|
||||
To use this library, run AFL++ like so:
|
||||
|
||||
```
|
||||
AFL_PRELOAD=/path/to/libdislocator.so ./afl-fuzz [...other params...]
|
||||
@ -62,7 +62,7 @@ Similarly to afl-tmin, the library is not "proprietary" and can be used with
|
||||
other fuzzers or testing tools without the need for any code tweaks. It does not
|
||||
require AFL-instrumented binaries to work.
|
||||
|
||||
Note that the AFL_PRELOAD approach (which AFL internally maps to LD_PRELOAD or
|
||||
Note that the AFL_PRELOAD approach (which AFL++ internally maps to LD_PRELOAD or
|
||||
DYLD_INSERT_LIBRARIES, depending on the OS) works only if the target binary is
|
||||
dynamically linked. Otherwise, attempting to use the library will have no
|
||||
effect.
|
||||
effect.
|
@ -43,7 +43,7 @@ when using afl-gcc. This setting specifically adds the following flags:
|
||||
The next step is to load this library via LD_PRELOAD. The optimal usage pattern
|
||||
is to allow afl-fuzz to fuzz normally for a while and build up a corpus, and
|
||||
then fire off the target binary, with libtokencap.so loaded, on every file found
|
||||
by AFL in that earlier run. This demonstrates the basic principle:
|
||||
by AFL++ in that earlier run. This demonstrates the basic principle:
|
||||
|
||||
```
|
||||
export AFL_TOKEN_FILE=$PWD/temp_output.txt
|
||||
|
Reference in New Issue
Block a user