Dailydave mailing list archives
Re: Does Fuzzing really work?
From: Jared DeMott <demottja () msu edu>
Date: Mon, 25 Sep 2006 16:43:21 -0400
Peter Winter-Smith wrote:
Hi Aviram, I can't speak for Dave, but I felt that his note "There are no new MSRPC bugs. You should give up looking for them" (http://seclists.org/dailydave/2006/q3/0160.html) was probably given more in the context of the MSRPC fuzzer that he had published (and/or provided with CANVAS/SILICA), and knowing what I do of Dave I suspect was more of a joke/challenge than a definitive statement ;-) The research looks very interesting however, in those figures that you gave to what degree do you take account for subsets of data that you are testing (fields within a given portion within a given protocol, and the format of the data that they can accept), etc, and the valid common interesting bad values which can typically be used in such circumstances (i.e data which conforms but has often been known to cause problems - strings of specific lengths, given sets of integer values which often cause problems, etc)?
Ya, I liked the post (fuzzers are our friends!) but the numbers are definitely a bit optimistic. Consider off by one's and the like. Or 2nd gen bugs like uninitialized heap/stack bugs. Also, some processes are more difficult to automatic (client fuzzing) and may require a little more time. I've been finding the PaiMei framework very useful to this end.
Just interested what makes up the numbers! :-) -Peter ----- Original Message ----- From: "Aviram Jenik" <aviram () beyondsecurity com> To: <dailydave () lists immunitysec com> Sent: Monday, September 25, 2006 8:35 PM Subject: [Dailydave] Does Fuzzing really work?There's a lot of talk lately on whether fuzzing can actually be used to find vulnerabilities - and more importantly, reliably rule out the existence of unknown vulnerabilities. Since most of this talk revolves around Dave's note "There are no new MSRPC bugs. You should give up looking for them" I thought this was the right forum to answer this question. The question was whether RPC fuzzing can really rule out vulnerabilities, and our experience shows it can (at least, as much as you can rule out anything in IT security). Let me throw some numbers at you(*). The FTP protocol has 310 "scenarios" of valid FTP sessions. If you try to overflow each time a different part of the command in every scenario you get a little over 12M attack combinations. If you use some of our nifty beSTORM 2.0 optimizations you get to 70,679 attack vectors. Even with the lamest FTP server allowing just 5 simultaneous connections and taking a full second to process each session it would take only 4 hours to fully test the protocol. FTP is too simple you say? With more complex protocols like SIP you have15,000 scenarios and something like 40,680,459 attack vectors afteroptimizations. Sounds scary at first, but a SIP server capable of handling 500 requests per second would take only 22 hours to test, which means you can leave it running when you go home for the weekend and come back for the results. If you don't feel like waiting 22 hours, put it on 5 machines and have an answer by 4 hours. If you don't feel like waiting 4 hours... well you get the point. HTTP is probably as complex as they come, but most servers can handle >100,000 requests per second in a closed environment and a fast local network. Suddenly trying all HTTP combinations is not as hard as it seems. And so on, and so on. My point is to those people who mock fuzzers - you either tried the wrong kind, or you tried them a long time ago. I'm not saying that buffer overflows are suddenly obsolete (don't delete that ZERT bookmark just yet!). But nowadays there is no reason for an FTP server to come out with buffer overflows; there's just no excuse. (*) Don't believe the numbers? Check the URL below and see for yourself. -- Regards, Aviram Jenik Beyond Security (703) 286-7725 x504 http://www.BeyondSecurity.com http://www.SecuriTeam.com Looking for Unknown Vulnerabilities? http://beyondsecurity.com/beSTORM _______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave_______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave
_______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave
Current thread:
- Re: Does Fuzzing really work?, (continued)
- Re: Does Fuzzing really work? Halvar Flake (Sep 26)
- Re: Does Fuzzing really work? ergosum (Sep 26)
- Re: Does Fuzzing really work? Charlie Miller (Sep 27)
- Re: Does Fuzzing really work? Ian Melven (Sep 27)
- Re: Does Fuzzing really work? ergosum (Sep 27)
- Re: Does Fuzzing really work? Jared DeMott (Sep 27)
- Re: Does Fuzzing really work? Martin Vuagnoux (Sep 28)
- Re: Does Fuzzing really work? Jared DeMott (Sep 28)
- Re: Does Fuzzing really work? Matt Hargett (Sep 28)
- Re: Does Fuzzing really work? Jared DeMott (Sep 29)