mirror of
https://github.com/AFLplusplus/AFLplusplus.git
synced 2025-06-09 16:51:34 +00:00
* use atomic read-modify-write increment for LLVM CLASSIC * Change other LLVM modes to atomic increments * sync (#886) * Create FUNDING.yml * Update FUNDING.yml * moved custom_mutator examples * unicorn speedtest makefile cleanup * fixed example location * fix qdbi * update util readme * work in progress: not working correctly yet * Frida persistent (#880) * Added x64 support for persistent mode (function call only), in-memory teest cases and complog * Review changes, fix NeverZero and code to parse the .text section of the main executable. Excluded ranges TBC * Various minor fixes and finished support for AFL_INST_LIBS * Review changes Co-authored-by: Your Name <you@example.com> * nits * fix frida mode * Integer overflow/underflow fixes in libdislocator (#889) * libdislocator: fixing integer overflow in 'max_mem' variable and setting 'max_mem' type to 'size_t' * libdislocator: fixing potential integer underflow in 'total_mem' variable due to its different values in different threads * Bumped warnings up to the max and fixed remaining issues (#890) Co-authored-by: Your Name <you@example.com> * nits * frida mode - support non-pie * nits * nit * update grammar mutator * Fixes for aarch64, OSX and other minor issues (#891) Co-authored-by: Your Name <you@example.com> * nits * nits * fix PCGUARD, build aflpp_driver with fPIC * Added representative fuzzbench test and test for libxml (#893) * Added representative fuzzbench test and test for libxml * Added support for building FRIDA from source with FRIDA_SOURCE=1 Co-authored-by: Your Name <you@example.com> * nits * update changelog * typos * still not working * fixed potential double free in custom trim (#881) * error handling, freeing mem * frida: complog -> cmplog * fix statsd writing * let aflpp_qemu_driver_hook.so build fail gracefully * fix stdin trimming * Support for AFL_ENTRYPOINT (#898) Co-authored-by: Your Name <you@example.com> * remove the input file .cur_input at the end of the fuzzing, if AFL_TMPDIR is used * reverse push (#901) * Create FUNDING.yml * Update FUNDING.yml * disable QEMU static pie Co-authored-by: Andrea Fioraldi <andreafioraldi@gmail.com> * clarify that no modifications are required. * add new test for frida_mode (please review) * typos * fix persistent mode (64-bit) * set ARCH for linux intel 32-bit for frida-gum-devkit * prepare for 32-bit support (later) * not on qemu 3 anymore * unicorn mips fixes * instrumentation further move to C++11 (#900) * unicorn fixes * first working NeverZero implementation * more unicorn fixes * Fix memory errors when trim causes testcase growth (#881) (#903) * Revert "fixed potential double free in custom trim (#881)" This reverts commit e9d2f72382cab75832721d859c3e731da071435d. * Revert "fix custom trim for increasing data" This reverts commit 86a8ef168dda766d2f25f15c15c4d3ecf21d0667. * Fix memory errors when trim causes testcase growth Modify trim_case_custom to avoid writing into in_buf because some custom mutators can cause the testcase to grow rather than shrink. Instead of modifying in_buf directly, we write the update out to the disk when trimming is complete, and then the caller is responsible for refreshing the in-memory buffer from the file. This is still a bit sketchy because it does need to modify q->len in order to notify the upper layers that something changed, and it could end up telling upper layer code that the q->len is *bigger* than the buffer (q->testcase_buf) that contains it, which is asking for trouble down the line somewhere... * Fix an unlikely situation Put back some `unlikely()` calls that were in the e9d2f72382cab75832721d859c3e731da071435d commit that was reverted. * add some comments * typo * Exit on time (#904) * Variable AFL_EXIT_ON_TIME description has been added. Variables AFL_EXIT_ON_TIME and afl_exit_on_time has been added. afl->exit_on_time variable initialization has been added. The asignment of a value to the afl->afl_env.afl_exit_on_time variable from environment variables has been added. Code to exit on timeout if new path not found has been added. * Type of afl_exit_on_time variable has been changed. Variable exit_on_time has been added to the afl_state_t structure. * Command `export AFL_EXIT_WHEN_DONE=1` has been added. * Millisecond to second conversion has been added. Call get_cur_time() has been added. * Revert to using the saved current time value. * Useless check has been removed. * fix new path to custom-mutators * ensure crashes/README.txt exists * fix * Changes to bump FRIDA version and to clone FRIDA repo in to build directory rather than use a submodule as the FRIDA build scripts don't like it (#906) Co-authored-by: Your Name <you@example.com> * Fix numeric overflow in cmplog implementation (#907) Co-authored-by: Your Name <you@example.com> * testcase fixes for unicorn * remove merge conflict artifacts * fix afl-plot * Changes to remove binaries from frida_mode (#913) Co-authored-by: Your Name <you@example.com> * Frida cmplog fail fast (#914) * Changes to remove binaries from frida_mode * Changes to make cmplog fail fast Co-authored-by: Your Name <you@example.com> * afl-plot: relative time * arch linux and mac os support for afl-system-config * typo * code-format * update documentation * github workflow for qemu * OSX-specific improvements (#912) * Fix afl-cc to work correctly by default on OSX using xcode - CLANG_ENV_VAR must be set for afl-as to work - Use clang mode by default if no specific compiler selected * Add OSX-specific documentation for configuring shared memory * Fixes to memory operands for complog (#916) Co-authored-by: Your Name <you@example.com> * fix a few cur_time uses * added bounds check to pivot_inputs (fixes #921) * additional safety checks for restarts * restrict afl-showmap in_file size * fix seed crash disable * add warning for afl-showmap partial read * no core dumps * AFL_PRINT_FILENAMES added * more documentation for AFL_EXIT_ON_TIME * Flushing for AFL_PRINT_FILENAMES * FASAN Support (#918) * FASAN Support * Fix handling of Address Sanitizer DSO * Changes to identification of Address Sanitizer DSO Co-authored-by: Your Name <you@example.com> * Support for x86 (#920) Co-authored-by: Your Name <you@example.com> * Update frida_mode readme (#925) * libqasan: use syscalls for read and write * update readme * Minor integration tweaks (#926) Co-authored-by: Your Name <you@example.com> * merge * fix afl-fuzz.c frida preload * cleaned up AFL_PRINT_FILENAMES env * Changes to have persistent mode exit at the end of the loop (#928) Co-authored-by: Your Name <you@example.com> * fix llvm-dict2file * push to stable (#931) (#932) * sync (#886) * Create FUNDING.yml * Update FUNDING.yml * moved custom_mutator examples * unicorn speedtest makefile cleanup * fixed example location * fix qdbi * update util readme * Frida persistent (#880) * Added x64 support for persistent mode (function call only), in-memory teest cases and complog * Review changes, fix NeverZero and code to parse the .text section of the main executable. Excluded ranges TBC * Various minor fixes and finished support for AFL_INST_LIBS * Review changes Co-authored-by: Your Name <you@example.com> * nits * fix frida mode * Integer overflow/underflow fixes in libdislocator (#889) * libdislocator: fixing integer overflow in 'max_mem' variable and setting 'max_mem' type to 'size_t' * libdislocator: fixing potential integer underflow in 'total_mem' variable due to its different values in different threads * Bumped warnings up to the max and fixed remaining issues (#890) Co-authored-by: Your Name <you@example.com> * nits * frida mode - support non-pie * nits * nit * update grammar mutator * Fixes for aarch64, OSX and other minor issues (#891) Co-authored-by: Your Name <you@example.com> * nits * nits * fix PCGUARD, build aflpp_driver with fPIC * Added representative fuzzbench test and test for libxml (#893) * Added representative fuzzbench test and test for libxml * Added support for building FRIDA from source with FRIDA_SOURCE=1 Co-authored-by: Your Name <you@example.com> * nits * update changelog * typos * fixed potential double free in custom trim (#881) * error handling, freeing mem * frida: complog -> cmplog * fix statsd writing * let aflpp_qemu_driver_hook.so build fail gracefully * fix stdin trimming * Support for AFL_ENTRYPOINT (#898) Co-authored-by: Your Name <you@example.com> * remove the input file .cur_input at the end of the fuzzing, if AFL_TMPDIR is used * reverse push (#901) * Create FUNDING.yml * Update FUNDING.yml * disable QEMU static pie Co-authored-by: Andrea Fioraldi <andreafioraldi@gmail.com> * clarify that no modifications are required. * add new test for frida_mode (please review) * typos * fix persistent mode (64-bit) * set ARCH for linux intel 32-bit for frida-gum-devkit * prepare for 32-bit support (later) * not on qemu 3 anymore * unicorn mips fixes * instrumentation further move to C++11 (#900) * unicorn fixes * more unicorn fixes * Fix memory errors when trim causes testcase growth (#881) (#903) * Revert "fixed potential double free in custom trim (#881)" This reverts commit e9d2f72382cab75832721d859c3e731da071435d. * Revert "fix custom trim for increasing data" This reverts commit 86a8ef168dda766d2f25f15c15c4d3ecf21d0667. * Fix memory errors when trim causes testcase growth Modify trim_case_custom to avoid writing into in_buf because some custom mutators can cause the testcase to grow rather than shrink. Instead of modifying in_buf directly, we write the update out to the disk when trimming is complete, and then the caller is responsible for refreshing the in-memory buffer from the file. This is still a bit sketchy because it does need to modify q->len in order to notify the upper layers that something changed, and it could end up telling upper layer code that the q->len is *bigger* than the buffer (q->testcase_buf) that contains it, which is asking for trouble down the line somewhere... * Fix an unlikely situation Put back some `unlikely()` calls that were in the e9d2f72382cab75832721d859c3e731da071435d commit that was reverted. * typo * Exit on time (#904) * Variable AFL_EXIT_ON_TIME description has been added. Variables AFL_EXIT_ON_TIME and afl_exit_on_time has been added. afl->exit_on_time variable initialization has been added. The asignment of a value to the afl->afl_env.afl_exit_on_time variable from environment variables has been added. Code to exit on timeout if new path not found has been added. * Type of afl_exit_on_time variable has been changed. Variable exit_on_time has been added to the afl_state_t structure. * Command `export AFL_EXIT_WHEN_DONE=1` has been added. * Millisecond to second conversion has been added. Call get_cur_time() has been added. * Revert to using the saved current time value. * Useless check has been removed. * fix new path to custom-mutators * ensure crashes/README.txt exists * fix * Changes to bump FRIDA version and to clone FRIDA repo in to build directory rather than use a submodule as the FRIDA build scripts don't like it (#906) Co-authored-by: Your Name <you@example.com> * Fix numeric overflow in cmplog implementation (#907) Co-authored-by: Your Name <you@example.com> * testcase fixes for unicorn * remove merge conflict artifacts * fix afl-plot * Changes to remove binaries from frida_mode (#913) Co-authored-by: Your Name <you@example.com> * Frida cmplog fail fast (#914) * Changes to remove binaries from frida_mode * Changes to make cmplog fail fast Co-authored-by: Your Name <you@example.com> * afl-plot: relative time * arch linux and mac os support for afl-system-config * typo * code-format * update documentation * github workflow for qemu * OSX-specific improvements (#912) * Fix afl-cc to work correctly by default on OSX using xcode - CLANG_ENV_VAR must be set for afl-as to work - Use clang mode by default if no specific compiler selected * Add OSX-specific documentation for configuring shared memory * Fixes to memory operands for complog (#916) Co-authored-by: Your Name <you@example.com> * fix a few cur_time uses * added bounds check to pivot_inputs (fixes #921) * additional safety checks for restarts * restrict afl-showmap in_file size * fix seed crash disable * add warning for afl-showmap partial read * no core dumps * AFL_PRINT_FILENAMES added * more documentation for AFL_EXIT_ON_TIME * Flushing for AFL_PRINT_FILENAMES * FASAN Support (#918) * FASAN Support * Fix handling of Address Sanitizer DSO * Changes to identification of Address Sanitizer DSO Co-authored-by: Your Name <you@example.com> * Support for x86 (#920) Co-authored-by: Your Name <you@example.com> * Update frida_mode readme (#925) * libqasan: use syscalls for read and write * update readme * Minor integration tweaks (#926) Co-authored-by: Your Name <you@example.com> * merge * fix afl-fuzz.c frida preload * cleaned up AFL_PRINT_FILENAMES env * Changes to have persistent mode exit at the end of the loop (#928) Co-authored-by: Your Name <you@example.com> * fix llvm-dict2file Co-authored-by: Dominik Maier <domenukk@gmail.com> Co-authored-by: WorksButNotTested <62701594+WorksButNotTested@users.noreply.github.com> Co-authored-by: Your Name <you@example.com> Co-authored-by: Dmitry Zheregelya <zheregelya.d@gmail.com> Co-authored-by: hexcoder <hexcoder-@users.noreply.github.com> Co-authored-by: hexcoder- <heiko@hexco.de> Co-authored-by: Andrea Fioraldi <andreafioraldi@gmail.com> Co-authored-by: David CARLIER <devnexen@gmail.com> Co-authored-by: realmadsci <71108352+realmadsci@users.noreply.github.com> Co-authored-by: Roman M. Iudichev <SecNotice@ya.ru> Co-authored-by: Dustin Spicuzza <dustin@virtualroadside.com> Co-authored-by: Dominik Maier <domenukk@gmail.com> Co-authored-by: WorksButNotTested <62701594+WorksButNotTested@users.noreply.github.com> Co-authored-by: Your Name <you@example.com> Co-authored-by: Dmitry Zheregelya <zheregelya.d@gmail.com> Co-authored-by: hexcoder <hexcoder-@users.noreply.github.com> Co-authored-by: hexcoder- <heiko@hexco.de> Co-authored-by: Andrea Fioraldi <andreafioraldi@gmail.com> Co-authored-by: David CARLIER <devnexen@gmail.com> Co-authored-by: realmadsci <71108352+realmadsci@users.noreply.github.com> Co-authored-by: Roman M. Iudichev <SecNotice@ya.ru> Co-authored-by: Dustin Spicuzza <dustin@virtualroadside.com> * improve error msg * Added documentation for wine LoadLibrary workaround (#933) * Fix cmake target compilation command example (#934) - Fix typo DCMAKE_C_COMPILERC -> DCMAKE_C_COMPILER. - Add `cd build` after `mkdir build`. * showmap passes queue items in alphabetical order * added tmp files to gitignore * lenient dict parsing, no map size enum for binary fuzzing * added info about showmap queue directions * update binary-only doc * turn off map size detection if skip_bin_check is set * Typo * update docs * update afl-system-config * Set kill signal before using it in afl-showmap (#935) * fix afl-cc help output * add libafl to binary-only doc * update docs * less executions on variable paths * AFL_SKIP_CRASHES is obsolete since 3.0 * add AFL_TRY_AFFINITY * Typo * Typo * Typo/wording * tweaks * typos * fix afl-whatsup help output * fix afl-plot output * fix for MacOS * fix cmpcov doc for qemu * fix tmpfile removal * update dockerfile * Frida (#940) * Added re2 test * Added libpcap test * Fix validation of setting of ADDR_NO_RANDOMIZE * Added support for printing original and instrumented code Co-authored-by: Your Name <you@example.com> * Support for AFL_FRIDA_PERSISTENT_RET (#941) Co-authored-by: Your Name <you@example.com> * Changes to add missing exclusion of ranges (#943) Co-authored-by: Your Name <you@example.com> * add --afl-noopt to afl-cc * docs: fix link to README in QuickStartGuide (#946) * Support writing Stalker stats (#945) * Support writing Stalker stats * Fixed string handling in print functions Co-authored-by: Your Name <you@example.com> * afl-cmin help fix, aflpp_driver - + @@ support * fix for afl-showmap * support new env var AFL_LLVM_THREADSAFE_INST to enable atomic counters. add new test case for that. * add documentation for AFL_LLVM_THREADSAFE_INST * add support for AFL_LLVM_THREADSAFE_INST to other LLVM passes * add missing include for _exit() * threadsafe doc fixes, code format * Wording: "never zero" -> NeverZero * fix afl_custom_post_process with multiple custom mutators * fix docs * debug ck_write * fixed potential diff by 0 * fixes * fix classic threadsafe counters Co-authored-by: van Hauser <vh@thc.org> Co-authored-by: Dominik Maier <domenukk@gmail.com> Co-authored-by: WorksButNotTested <62701594+WorksButNotTested@users.noreply.github.com> Co-authored-by: Your Name <you@example.com> Co-authored-by: Dmitry Zheregelya <zheregelya.d@gmail.com> Co-authored-by: Andrea Fioraldi <andreafioraldi@gmail.com> Co-authored-by: David CARLIER <devnexen@gmail.com> Co-authored-by: realmadsci <71108352+realmadsci@users.noreply.github.com> Co-authored-by: Roman M. Iudichev <SecNotice@ya.ru> Co-authored-by: Dustin Spicuzza <dustin@virtualroadside.com> Co-authored-by: 0x4d5a-ctf <51098072+0x4d5a-ctf@users.noreply.github.com> Co-authored-by: Tommy Chiang <oToToT@users.noreply.github.com> Co-authored-by: buherator <buherator@silentsignal.hu> Co-authored-by: Dag Heyman Kajevic <dag.heyman@gmail.com>
302 lines
12 KiB
Markdown
302 lines
12 KiB
Markdown
# Custom Mutators in AFL++
|
|
|
|
This file describes how you can implement custom mutations to be used in AFL.
|
|
For now, we support C/C++ library and Python module, collectivelly named as the
|
|
custom mutator.
|
|
|
|
There is also experimental support for Rust in `custom_mutators/rust`.
|
|
Please refer to that directory for documentation.
|
|
Run ```cargo doc -p custom_mutator --open``` in that directory to view the
|
|
documentation in your web browser.
|
|
|
|
Implemented by
|
|
- C/C++ library (`*.so`): Khaled Yakdan from Code Intelligence (<yakdan@code-intelligence.de>)
|
|
- Python module: Christian Holler from Mozilla (<choller@mozilla.com>)
|
|
|
|
## 1) Introduction
|
|
|
|
Custom mutators can be passed to `afl-fuzz` to perform custom mutations on test
|
|
cases beyond those available in AFL. For example, to enable structure-aware
|
|
fuzzing by using libraries that perform mutations according to a given grammar.
|
|
|
|
The custom mutator is passed to `afl-fuzz` via the `AFL_CUSTOM_MUTATOR_LIBRARY`
|
|
or `AFL_PYTHON_MODULE` environment variable, and must export a fuzz function.
|
|
Now afl also supports multiple custom mutators which can be specified in the same `AFL_CUSTOM_MUTATOR_LIBRARY` environment variable like this.
|
|
```bash
|
|
export AFL_CUSTOM_MUTATOR_LIBRARY="full/path/to/mutator_first.so;full/path/to/mutator_second.so"
|
|
```
|
|
Please see [APIs](#2-apis) and [Usage](#3-usage) for detail.
|
|
|
|
The custom mutation stage is set to be the first non-deterministic stage (right before the havoc stage).
|
|
|
|
Note: If `AFL_CUSTOM_MUTATOR_ONLY` is set, all mutations will solely be
|
|
performed with the custom mutator.
|
|
|
|
## 2) APIs
|
|
|
|
C/C++:
|
|
```c
|
|
void *afl_custom_init(afl_state_t *afl, unsigned int seed);
|
|
unsigned int afl_custom_fuzz_count(void *data, const unsigned char *buf, size_t buf_size);
|
|
size_t afl_custom_fuzz(void *data, unsigned char *buf, size_t buf_size, unsigned char **out_buf, unsigned char *add_buf, size_t add_buf_size, size_t max_size);
|
|
const char *afl_custom_describe(void *data, size_t max_description_len);
|
|
size_t afl_custom_post_process(void *data, unsigned char *buf, size_t buf_size, unsigned char **out_buf);
|
|
int afl_custom_init_trim(void *data, unsigned char *buf, size_t buf_size);
|
|
size_t afl_custom_trim(void *data, unsigned char **out_buf);
|
|
int afl_custom_post_trim(void *data, unsigned char success);
|
|
size_t afl_custom_havoc_mutation(void *data, unsigned char *buf, size_t buf_size, unsigned char **out_buf, size_t max_size);
|
|
unsigned char afl_custom_havoc_mutation_probability(void *data);
|
|
unsigned char afl_custom_queue_get(void *data, const unsigned char *filename);
|
|
void afl_custom_queue_new_entry(void *data, const unsigned char *filename_new_queue, const unsigned int *filename_orig_queue);
|
|
const char* afl_custom_introspection(my_mutator_t *data);
|
|
void afl_custom_deinit(void *data);
|
|
```
|
|
|
|
Python:
|
|
```python
|
|
def init(seed):
|
|
pass
|
|
|
|
def fuzz_count(buf, add_buf, max_size):
|
|
return cnt
|
|
|
|
def fuzz(buf, add_buf, max_size):
|
|
return mutated_out
|
|
|
|
def describe(max_description_length):
|
|
return "description_of_current_mutation"
|
|
|
|
def post_process(buf):
|
|
return out_buf
|
|
|
|
def init_trim(buf):
|
|
return cnt
|
|
|
|
def trim():
|
|
return out_buf
|
|
|
|
def post_trim(success):
|
|
return next_index
|
|
|
|
def havoc_mutation(buf, max_size):
|
|
return mutated_out
|
|
|
|
def havoc_mutation_probability():
|
|
return probability # int in [0, 100]
|
|
|
|
def queue_get(filename):
|
|
return True
|
|
|
|
def queue_new_entry(filename_new_queue, filename_orig_queue):
|
|
pass
|
|
|
|
def introspection():
|
|
return string
|
|
|
|
def deinit(): # optional for Python
|
|
pass
|
|
```
|
|
|
|
### Custom Mutation
|
|
|
|
- `init`:
|
|
|
|
This method is called when AFL++ starts up and is used to seed RNG and set up buffers and state.
|
|
|
|
- `queue_get` (optional):
|
|
|
|
This method determines whether the custom fuzzer should fuzz the current
|
|
queue entry or not
|
|
|
|
- `fuzz_count` (optional):
|
|
|
|
When a queue entry is selected to be fuzzed, afl-fuzz selects the number
|
|
of fuzzing attempts with this input based on a few factors.
|
|
If however the custom mutator wants to set this number instead on how often
|
|
it is called for a specific queue entry, use this function.
|
|
This function is most useful if `AFL_CUSTOM_MUTATOR_ONLY` is **not** used.
|
|
|
|
- `fuzz` (optional):
|
|
|
|
This method performs custom mutations on a given input. It also accepts an
|
|
additional test case.
|
|
Note that this function is optional - but it makes sense to use it.
|
|
You would only skip this if `post_process` is used to fix checksums etc.
|
|
so if you are using it e.g. as a post processing library.
|
|
Note that a length > 0 *must* be returned!
|
|
|
|
- `describe` (optional):
|
|
|
|
When this function is called, it shall describe the current testcase,
|
|
generated by the last mutation. This will be called, for example,
|
|
to name the written testcase file after a crash occurred.
|
|
Using it can help to reproduce crashing mutations.
|
|
|
|
- `havoc_mutation` and `havoc_mutation_probability` (optional):
|
|
|
|
`havoc_mutation` performs a single custom mutation on a given input. This
|
|
mutation is stacked with other mutations in havoc. The other method,
|
|
`havoc_mutation_probability`, returns the probability that `havoc_mutation`
|
|
is called in havoc. By default, it is 6%.
|
|
|
|
- `post_process` (optional):
|
|
|
|
For some cases, the format of the mutated data returned from the custom
|
|
mutator is not suitable to directly execute the target with this input.
|
|
For example, when using libprotobuf-mutator, the data returned is in a
|
|
protobuf format which corresponds to a given grammar. In order to execute
|
|
the target, the protobuf data must be converted to the plain-text format
|
|
expected by the target. In such scenarios, the user can define the
|
|
`post_process` function. This function is then transforming the data into the
|
|
format expected by the API before executing the target.
|
|
|
|
This can return any python object that implements the buffer protocol and
|
|
supports PyBUF_SIMPLE. These include bytes, bytearray, etc.
|
|
|
|
- `queue_new_entry` (optional):
|
|
|
|
This methods is called after adding a new test case to the queue.
|
|
|
|
- `introspection` (optional):
|
|
|
|
This method is called after a new queue entry, crash or timeout is
|
|
discovered if compiled with INTROSPECTION. The custom mutator can then
|
|
return a string (const char *) that reports the exact mutations used.
|
|
|
|
- `deinit`:
|
|
|
|
The last method to be called, deinitializing the state.
|
|
|
|
Note that there are also three functions for trimming as described in the
|
|
next section.
|
|
|
|
### Trimming Support
|
|
|
|
The generic trimming routines implemented in AFL++ can easily destroy the
|
|
structure of complex formats, possibly leading to a point where you have a lot
|
|
of test cases in the queue that your Python module cannot process anymore but
|
|
your target application still accepts. This is especially the case when your
|
|
target can process a part of the input (causing coverage) and then errors out
|
|
on the remaining input.
|
|
|
|
In such cases, it makes sense to implement a custom trimming routine. The API
|
|
consists of multiple methods because after each trimming step, we have to go
|
|
back into the C code to check if the coverage bitmap is still the same for the
|
|
trimmed input. Here's a quick API description:
|
|
|
|
- `init_trim` (optional):
|
|
|
|
This method is called at the start of each trimming operation and receives
|
|
the initial buffer. It should return the amount of iteration steps possible
|
|
on this input (e.g. if your input has n elements and you want to remove them
|
|
one by one, return n, if you do a binary search, return log(n), and so on).
|
|
|
|
If your trimming algorithm doesn't allow to determine the amount of
|
|
(remaining) steps easily (esp. while running), then you can alternatively
|
|
return 1 here and always return 0 in `post_trim` until you are finished and
|
|
no steps remain. In that case, returning 1 in `post_trim` will end the
|
|
trimming routine. The whole current index/max iterations stuff is only used
|
|
to show progress.
|
|
|
|
- `trim` (optional)
|
|
|
|
This method is called for each trimming operation. It doesn't have any
|
|
arguments because we already have the initial buffer from `init_trim` and we
|
|
can memorize the current state in the data variables. This can also save
|
|
reparsing steps for each iteration. It should return the trimmed input
|
|
buffer, where the returned data must not exceed the initial input data in
|
|
length. Returning anything that is larger than the original data (passed to
|
|
`init_trim`) will result in a fatal abort of AFL++.
|
|
|
|
- `post_trim` (optional)
|
|
|
|
This method is called after each trim operation to inform you if your
|
|
trimming step was successful or not (in terms of coverage). If you receive
|
|
a failure here, you should reset your input to the last known good state.
|
|
In any case, this method must return the next trim iteration index (from 0
|
|
to the maximum amount of steps you returned in `init_trim`).
|
|
|
|
Omitting any of three trimming methods will cause the trimming to be disabled
|
|
and trigger a fallback to the builtin default trimming routine.
|
|
|
|
### Environment Variables
|
|
|
|
Optionally, the following environment variables are supported:
|
|
|
|
- `AFL_CUSTOM_MUTATOR_ONLY`
|
|
|
|
Disable all other mutation stages. This can prevent broken testcases
|
|
(those that your Python module can't work with anymore) to fill up your
|
|
queue. Best combined with a custom trimming routine (see below) because
|
|
trimming can cause the same test breakage like havoc and splice.
|
|
|
|
|
|
- `AFL_PYTHON_ONLY`
|
|
|
|
Deprecated and removed, use `AFL_CUSTOM_MUTATOR_ONLY` instead.
|
|
|
|
- `AFL_DEBUG`
|
|
|
|
When combined with `AFL_NO_UI`, this causes the C trimming code to emit
|
|
additional messages about the performance and actions of your custom
|
|
trimmer. Use this to see if it works :)
|
|
|
|
## 3) Usage
|
|
|
|
### Prerequisite
|
|
|
|
For Python mutators, the python 3 or 2 development package is required. On
|
|
Debian/Ubuntu/Kali it can be installed like this:
|
|
|
|
```bash
|
|
sudo apt install python3-dev
|
|
# or
|
|
sudo apt install python-dev
|
|
```
|
|
|
|
Then, AFL++ can be compiled with Python support. The AFL++ Makefile detects
|
|
Python 2 and 3 through `python-config` if it is in the PATH and compiles
|
|
`afl-fuzz` with the feature if available.
|
|
|
|
Note: for some distributions, you might also need the package `python[23]-apt`.
|
|
In case your setup is different, set the necessary variables like this:
|
|
`PYTHON_INCLUDE=/path/to/python/include LDFLAGS=-L/path/to/python/lib make`.
|
|
|
|
### Custom Mutator Preparation
|
|
|
|
For C/C++ mutators, the source code must be compiled as a shared object:
|
|
```bash
|
|
gcc -shared -Wall -O3 example.c -o example.so
|
|
```
|
|
Note that if you specify multiple custom mutators, the corresponding functions will
|
|
be called in the order in which they are specified. e.g first `post_process` function of
|
|
`example_first.so` will be called and then that of `example_second.so`.
|
|
|
|
### Run
|
|
|
|
C/C++
|
|
```bash
|
|
export AFL_CUSTOM_MUTATOR_LIBRARY="/full/path/to/example_first.so;/full/path/to/example_second.so"
|
|
afl-fuzz /path/to/program
|
|
```
|
|
|
|
Python
|
|
```bash
|
|
export PYTHONPATH=`dirname /full/path/to/example.py`
|
|
export AFL_PYTHON_MODULE=example
|
|
afl-fuzz /path/to/program
|
|
```
|
|
|
|
## 4) Example
|
|
|
|
Please see [example.c](../custom_mutators/examples/example.c) and
|
|
[example.py](../custom_mutators/examples/example.py)
|
|
|
|
## 5) Other Resources
|
|
|
|
- AFL libprotobuf mutator
|
|
- [bruce30262/libprotobuf-mutator_fuzzing_learning](https://github.com/bruce30262/libprotobuf-mutator_fuzzing_learning/tree/master/4_libprotobuf_aflpp_custom_mutator)
|
|
- [thebabush/afl-libprotobuf-mutator](https://github.com/thebabush/afl-libprotobuf-mutator)
|
|
- [XML Fuzzing@NullCon 2017](https://www.agarri.fr/docs/XML_Fuzzing-NullCon2017-PUBLIC.pdf)
|
|
- [A bug detected by AFL + XML-aware mutators](https://bugs.chromium.org/p/chromium/issues/detail?id=930663)
|