pr0v3rbs / FirmAE

Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
MIT License
603 stars 117 forks source link

Fuzzer results analysis #42

Open rssample opened 2 years ago

rssample commented 2 years ago

Fuzzer log files are very large, so how do you know if there are CI and BOF vulnerabilities? Thanks.

pr0v3rbs commented 1 year ago

Sorry for the late,

For the CI, you can find the [ANALYZE] logs in the scratch/${IID}/qemu.final.serial.log file. It shows the execve syscall was executed while performing a particular request format with a specific key and value. You can find the matched signature in the analyses/analyses_log/${BRAND}/${IID}/fuzzer_log_ci file.

For the BOF, you can find a crash log such as SIGSEGV in the scratch/${IID}/qemu.final.serial.log file. It will contain an overflowed '0x61616161' stack memory with an index string. You can find the matched index in the analyses/analyses_log/${BRAND}/${IID}/fuzzer_bof_bof file.

Thanks.