diff options
author | fedotoff <fedotoff@ispras.ru> | 2022-11-21 15:18:19 +0300 |
---|---|---|
committer | fedotoff <fedotoff@ispras.ru> | 2022-11-21 15:18:19 +0300 |
commit | 2c39c51263fd38de50ef41ff30075c1282997e14 (patch) | |
tree | f8cd1b683076df246fc9c235679aa4abee2a47c7 | |
parent | ef0921d858be0d54f3ebfe88e361ba54fb9ba69d (diff) | |
download | afl++-2c39c51263fd38de50ef41ff30075c1282997e14.tar.gz |
casr-afl short description in fuzzing_in_depth.
-rw-r--r-- | docs/fuzzing_in_depth.md | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/docs/fuzzing_in_depth.md b/docs/fuzzing_in_depth.md index a0bf1566..1645ba5c 100644 --- a/docs/fuzzing_in_depth.md +++ b/docs/fuzzing_in_depth.md @@ -900,6 +900,32 @@ then color-codes the input based on which sections appear to be critical and which are not; while not bulletproof, it can often offer quick insights into complex file formats. +`casr-afl` from [CASR](https://github.com/ispras/casr) tools provides a +straightforward CASR integration with AFL++. While walking through afl +instances, `casr-afl` generates crash reports depending on target binary. For +binary with ASAN `casr-san` is used, otherwise `casr-gdb`. On the next step +report deduplication is done by `casr-cluster`. Finally, reports are triaged +into clusters. Crash reports contain many useful information: severity +(like [exploitable](https://github.com/jfoote/exploitable)), OS and package +versions, command line, stack trace, register values, disassembly, and even +source code fragment where crash appeared. + +**NOTE:** `casr-gdb` and `casr-san` should be in PATH to make `casr-afl` work. +Before using casr-afl, please, follow the installation +[guide](https://github.com/ispras/casr#getting-started). Using `casr-afl` is +very simple: + +```shell +casr-afl -i /path/to/afl/out/dir -o /path/to/casr/out/dir +``` + +Output directory contains subdirectories (cl1...clN) with report clusters. To +view reports you could use `casr-cli` tool: + +```shell +casr-cli /path/to/casr/out/dir/cl1/report.casrep +``` + ## 5. CI fuzzing Some notes on continuous integration (CI) fuzzing - this fuzzing is different to |