作者:linshifei
去年的时候整理了下业界的fuzz,做了个梳理,现在准备整理下,共享出来.不然,年纪大了就忘了:)
名称 | 简介 | 地址 | 备注 |
Sulley | http://www.fuzzing.org/wp-content/Sulley%20Fuzzing%20Framework.exe | Python的fuzzing框架,包括进程监视、网络监视、虚拟机控制 | |
SPIKE | SPIKE is an attempt to write an easy to use generic protocol API that helps reverse engineer new and unknown network protocols. It features several working examples. Includes a web server NTLM Authentication brute forcer and example code that parses web applications and DCE-RPC (MSRPC). | http://www.immunitysec.com/resources-freesoftware.shtml | 一个C++的接口 fuzz框架,fuzz http server等比较成熟。 |
Scratch | Scratch is an advanced protocol destroyer (”fuzzer”) which can routinely find a wide variety of vulnerabilities from a simple packet. scratch does complex parsing of binary files to determine what to fuzz with what data. scratch also comes with a framework for fuzzing binary protocols such as SSL and SMB. | http://packetstormsecurity.org/UNIX/misc/scratch.rar | Python的框架,支持2进制fuzz,主要针对formatstring overflow 等模块fuzz。Audits目录下有些测试用例产生的例子(formatstring overflow 等) |
LXAPI | Library Exploit API – A selection of python methods designed for bugtesting and exploitation of local and remote vulnerabilities. It includes a fuzz testing compenent, miscellaneous shellcode methods and a simple GUI. LxAPI is currently a work-in-progress. | http://lxapi.sourceforge.net/ | 没有下载到。 |
antiparse | antiparser is a fuzz testing and fault injection API. The purpose of antiparser is to provide an API that can be used to model network protocols and file formats by their composite data types. Once a model has been created, the antiparser has various methods for creating random sets of data that deviates in ways that will ideally trigger software bugs or security vulnerabilities. Requires Python 2.3 or later. | http://antiparser.sourceforge.net/ | 基于Python的fuzzing框架,主要提供各种各样的数据变异API |
Autodafe | Autodafe is a fuzzing framework that can be used to identify boundary validation and other issues in protocols and applications. Written by Martin Vuagnoux. | http://packetstormsecurity.org/fuzzer/autodafe-0.1.tar.gz | 支持sniffer包 自动生成测试数据,基于block,自动计算block的大小,带调试器,能自动监控 危险函数和测试用例间的情况,比较好的一个。 |
dfuz | a remote protocol fuzzer/triggerer which can do many things such as sending random data/random sizes, together with the data you want. it has alot of ways to tell the program to use this data by using rule files which will be later parsed by the program itself, and with several options and ways to make it very specific, and very flexible. It’s not only a remote protocol fuzzer as itself, but it is a scripting-like motor on which you can create any kind of payload. User-friendly.(Unix) | http://www.genexx.org/dfuz/ | 一个简单易用的fuzz工具 |
Evolutionary Fuzzing System (EFS) | A fuzzer which attempts to dynamically learn a protocol using code coverage and other feedback mechanisms. | http://www.vdalabs.com/tools/efs_gpf.html | Python,fuzzing框架,包含进程调试 |
General Purpose Fuzzer (GPF) | Written in C, GPF has a number of modes ranging from simple pure random fuzzing to more complex protocol tokenization. | http://www.vdalabs.com/tools/efs_gpf.html | C,只有通用的协议 |
Protocol Informatics | Slides, whitepaper and code from the last publicly seen snapshot from Marshall Beddoe’s work. | http://www.fuzzing.org/wp-content/Protocol%20Informatics.zip | 通过统计的等技术自动识别协议,统计部分比较新颖,其他部分一般。 |
Schemer | XML driven generic file and protocol fuzzer. | http://www.fuzzware.net/Schemer/Schemer.htm | 基于XML定义格式,协议审计感觉比较麻烦,建议file可以采用,结合模板的形式。 |
SMUDGE | Pure Python network protocol fuzzer from [email protected] | http://www.fuzzing.org/wp-content/SMUDGE.zip | Python,但是不支持UDP |
taof | Written in Python, a cross-platform GUI driven network protocol fuzzing environment for both UNIX and Windows systems. | http://theartoffuzzing.com/ | Python,基于代理模式,不支持UDP |
Bruteforce Exploit Detector | This is a collection of scripts to automatically test
implementations of different protocols for buffer overflows and / or format string vulnerabilities, by sending a lot of long strings to a server. |
http://www.cobra-basket.de/bed.html | Perl,仅支持FTP/SMTP/POP/HTTP/IRC/IMAP/PJL/LPD/FINGER/SOCKS4/SOCKS5 |
EFuzz | Efuzz is an easy to use Win32 tcp/udp protocol fuzzer
which finds unknown buffer overflows in local and remote services. Uses config files to define the range of malformed requests. Includes C source, released under GPL. |
http://soft.hackbase.com/page/2004-11-11/202714671777 | Win32,C,通过配置文件格式进行fuzzing |
zzuf | transparent application input fuzzer. Its purpose is to find bugs in applications by corrupting their user-contributed data (which more than often comes from untrusted sources on the Internet). It works by intercepting file and network operations and changing random bits in the program’s input. zzuf’s behaviour is deterministic, making it easier to reproduce bugs.(unix) | http://sam.zoy.org/zzuf/ | File Fuzz 比较强大,建议我们在fuzz file的时候使用。Linux平台。 |
JBroFuzz | a java based stateless network protocol fuzzer for penetration tests. It allows for the identification of certain classes of security bugs, by means of creating malformed data and having the network protocol in question consume the data. | http://sourceforge.net/projects/jbrofuzz | Java版本 |
fuzzCIRT | a simple fuzzer by Dennis Rand. Looks more suited for ASCII protocols than binary ones, but I could be wrong.(pl) | http://www.cirt.dk/tools/ | Perl,通过配置文件格式进行fuzzing |
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论