Fuzzing for known vulnerabilities with Rode0day & LAVA

$sudo apt-get install afl
$wget https://rode0day.mit.edu/static/archive/Beta.tar.gz
$tar -zxvf Beta.tar.gz
contents of the info.yaml file
our target binary compiles with warnings
ubuntu@ip-172–31–47–47:~/rode0day/beta/src/1$ afl-gcc buffalo.c -o aflbuffalo
our binary compiles with afl-gcc
hexdump of our input sample file, looks like a few 0x41’s or A’s and thats it
afl-fuzz -i ../../test/ -o ./crashes/ ./aflbuffalo @@
afl running against our instrumented binary.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Chris Hernandez

Chris Hernandez


Red Teamer — Security Researcher — Breaking things is fun, except when its not