nccgroup / umap2

Umap2 is the second revision of NCC Group's python based USB host security assessment tool.
GNU Affero General Public License v3.0
255 stars 71 forks source link

session-file #12

Closed custardcream closed 7 years ago

custardcream commented 7 years ago

Hi all

I have performed some fuzzing (nice tool) I have a kitty_***.log file with 'errors and failures' after running a complete fuzzing cycle (i assume errors/failures are worth further exploration) so running umap2kitty -s keyboard.stages -k -h tells me I can retest failed/error tests from a 'session-file', are the tests stored somewhere, do i need to create one, I'm missing something obvious im sure ;)

BinyaminSharet commented 7 years ago

Documenting the fuzzing process with Umap2 is still on my todo list, but I might get to it during the weekend.

The session file can be created by running umap2kitty with -k "-s <session_file_name>" and you will be able to retest failed/error cases from this session file (with -k "-r <session_file_name>"). This session file can also be used to resume the fuzzer if it was stopped in the middle.

If you know the test numbers with the issues, you can run them alone using -k "-t 1,2,3"

custardcream commented 7 years ago

thanks for the quick reply !

So i need to generate the session file during stage 2 of the readme eg. umap2kitty -s keyboard.stages -k "-s <session_file_name> ??

BinyaminSharet commented 7 years ago

Yup. I will try to update the documentation soon.

custardcream commented 7 years ago

great thank you, just to correct both our posts above, stage 2 should be - umap2kitty -s keyboard.stages -k "-f <session_file_name>"

to generate a session-file not -s

again thanks for your quick help !

BinyaminSharet commented 7 years ago

oops :) thanks, good point..

BinyaminSharet commented 7 years ago

Added fuzzing guide at: https://github.com/nccgroup/umap2/blob/master/docs/fuzzing.rst Closing this issue, but would like to know what's missing.