PacktPublishing / Fuzzing-Against-the-Machine

MIT License
73 stars 9 forks source link

Fuzzing Against the Machine

To know more about the making of the book: click on the whiteboard

The Making of: FuzzATM

Fuzzing Against the Machine

This is the code repository for Fuzzing Against the Machine, published by Packt.

For the Docker Images please refer to this link Filesystem Images They are pretty large. Be patient

Automate vulnerability research with emulated IoT devices on QEMU

What is this book about?

This book covers the following exciting features:

If you feel this book is for you, get your copy today!

<img src="https://raw.githubusercontent.com/PacktPublishing/GitHub/master/GitHub.png" alt="https://www.packtpub.com/" border="5" />

Instructions and Navigations

All of the code is organized into folders. For example, Chapter_4.

The code will look like the following:

#include <stdio.h> 

int main() { 
     printf("Hello, qemu fans!\n");
     return 0; 
}

Following is what you need for this book: This book is for security researchers, security professionals, embedded firmware engineers, and embedded software professionals. Learners interested in emulation, as well as software engineers interested in vulnerability research and exploitation, software testing, and embedded software development will also find it useful. The book assumes basic knowledge of programming (C and Python); operating systems (Linux and macOS); and the use of Linux shell, compilation, and debugging.

With the following software and hardware list you can run all code files present in the book (Chapter 1-12).

Software and Hardware List

Chapter Software required OS required
1-12 QEMU Arch, Debian/Ubuntu, RHEL/CentOS, and SUSE
1-12 AFL/AFL++ Arch, Debian/Ubuntu, RHEL/CentOS, and SUSE
1-12 Ghidra Arch, Debian/Ubuntu, RHEL/CentOS, and SUSE
1-12 Avatar2 Arch, Debian/Ubuntu, RHEL/CentOS, and SUSE

We also provide a PDF file that has color images of the screenshots/diagrams used in this book. Click here to download it.

Related products

Get to Know the Author

Antonio Nappa is the Application Analysis Team Leader at Zimperium Inc. He has been in the cybersecurity game since 17 years old. He holds a PhD in Software and Systems from the Madrid Institute of Advanced Studies. He has been a visiting scholar at UC Berkeley. His contributions have been published and recognized in international peer-reviewed venues. Since the DEFCON 2008 Finals, he never goes to sleep with a segfault.

Eduardo Blázquez is a PhD student of the University Carlos III of Madrid. He has been working in the cybersecurity area since 2017, with interests in Reverse Engineering and Malware Analysis. Currently, he is doing a PhD thesis about Android Security, but in his spare time he likes to study different topics like program analysis or operating system internals, and from time to time he likes to play different wargames about software exploitation.

Download a free PDF

If you have already purchased a print or Kindle version of this book, you can get a DRM-free PDF version at no cost.
Simply click on the link to claim your free PDF.

https://packt.link/free-ebook/9781804614976