aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorhac425 <hac425xxx@gmail.com>2019-11-14 14:30:29 +0000
committerhac425 <hac425xxx@gmail.com>2019-11-14 14:30:29 +0000
commitc8c004d568f639b09a70deecce6c634ac45d4842 (patch)
treefe154ed2206f9f9ce0bf8af922cb084b869ed663
parentab8fb271f71c50f46fac86fb7ac09593542726b3 (diff)
downloadafl++-c8c004d568f639b09a70deecce6c634ac45d4842.tar.gz
modify build.sh and add document
-rwxr-xr-xqbdi_mode/README.md197
-rwxr-xr-xqbdi_mode/build.sh37
-rwxr-xr-xqbdi_mode/demo-so.c39
-rwxr-xr-xqbdi_mode/template.cpp90
4 files changed, 288 insertions, 75 deletions
diff --git a/qbdi_mode/README.md b/qbdi_mode/README.md
new file mode 100755
index 00000000..8891d99e
--- /dev/null
+++ b/qbdi_mode/README.md
@@ -0,0 +1,197 @@
+# qbdi-based binary-only instrumentation for afl-fuzz
+
+## 1) Introduction
+
+The code in ./qbdi_mode allows you to build a standalone feature that
+using the QBDI framework to fuzz android native library.
+
+
+## 2) Build
+
+First download the Android NDK
+
+```
+https://developer.android.com/ndk/downloads
+https://dl.google.com/android/repository/android-ndk-r20-linux-x86_64.zip
+```
+
+Then unzip it and build the standalone-toolchain
+For x86_64 standalone-toolchain
+
+```
+unzip android-ndk-r20-linux-x86_64.zip
+cd android-ndk-r20/
+./build/tools/make_standalone_toolchain.py --arch x86_64 --api 21 --install-dir ../android-standalone-toolchain-x86_64
+```
+
+For x86 standalone-toolchain
+
+```
+./build/tools/make_standalone_toolchain.py --arch x86 --api 21 --install-dir ../android-standalone-toolchain-x86
+```
+
+Then download the QBDI SDK from website
+
+```
+https://qbdi.quarkslab.com/
+```
+
+For Android x86_64
+```
+https://github.com/QBDI/QBDI/releases/download/v0.7.0/QBDI-0.7.0-android-X86_64.tar.gz
+```
+
+Then decompress the sdk
+
+```
+mkdir android-qbdi-sdk-x86_64
+cp QBDI-0.7.0-android-X86_64.tar.gz android-qbdi-sdk-x86_64/
+cd android-qbdi-sdk-x86_64/
+tar xvf QBDI-0.7.0-android-X86_64.tar.gz
+```
+
+Now set the `STANDALONE_TOOLCHAIN_PATH` to the path of standalone-toolchain
+
+```
+export STANDALONE_TOOLCHAIN_PATH=/home/hac425/workspace/android-standalone-toolchain-x86_64
+```
+
+set the `QBDI_SDK_PATH` to the path of QBDI SDK
+
+```
+export QBDI_SDK_PATH=/home/hac425/workspace/AFLplusplus/qbdi_mode/android-qbdi-sdk-x86_64/
+```
+
+Then run the build.sh
+
+```
+./build.sh x86_64
+```
+
+this could build the afl-fuzz and also the qbdi template for android x86_64
+
+
+### Example
+
+The demo-so.c is an vulnerable library, it has a function for test
+
+```
+int target_func(char *buf, int size)
+{
+ printf("buffer:%p, size:%p\n", buf, size);
+ switch (buf[0])
+ {
+ case 1:
+ puts("222");
+ if (buf[1] == '\x44')
+ {
+ puts("null ptr deference");
+ *(char *)(0) = 1;
+ }
+ break;
+ case 0xff:
+ if (buf[2] == '\xff')
+ {
+ if (buf[1] == '\x44')
+ {
+ puts("crash....");
+ *(char *)(0xdeadbeef) = 1;
+ }
+ }
+ break;
+ default:
+ puts("default action");
+ break;
+ }
+
+ return 1;
+}
+```
+
+This could be build to `libdemo.so`.
+
+Then we should load the library in template.cpp and find the `target` function address.
+```
+ void *handle = dlopen(lib_path, RTLD_LAZY);
+ ..........................................
+ ..........................................
+ ..........................................
+ p_target_func = (target_func)dlsym(handle, "target_func");
+```
+
+then we read the data from file and call the function in `fuzz_func`
+
+```
+QBDI_NOINLINE int fuzz_func()
+{
+ // afl forkserver stuff
+ if (afl_setup())
+ {
+ afl_forkserver();
+ }
+
+ // read the data from file(argv[2])
+ unsigned long len = 0;
+ char *data = read_file(FPATH, &len);
+
+
+ printf("In fuzz_func\n");
+
+ // call the target function with input data.
+ p_target_func(data, len);
+ return 1;
+}
+```
+
+Just compile it
+```
+./build.sh x86_64
+```
+
+Then push the `afl-fuzz`, `loader`, `libdemo.so`, the `libQBDI.so` from the QBDI SDK and the `libc++_shared.so` from android-standalone-toolchain to android device
+
+```
+adb push afl-fuzz /data/local/tmp
+adb push libdemo.so /data/local/tmp
+adb push loader /data/local/tmp
+adb push android-qbdi-sdk-x86_64/usr/local/lib/libQBDI.so /data/local/tmp
+adb push ../../android-standalone-toolchain-x86_64/sysroot/usr/lib/x86_64-linux-android/libc++_shared.so
+/data/local/tmp
+```
+
+In android adb shell, we could try to run the loader
+```
+export LD_LIBRARY_PATH=/data/local/tmp
+./loader /data/local/tmp/libdemo.so init
+```
+the normal output like
+
+```
+# ./loader /data/local/tmp/libdemo.so init p_target_func:0x7b41ac26e600
+In fuzz_func
+ offset:0x600
+ offset:0x580
+buffer:0x7b41abe2b050, size:0x4
+ offset:0x628
+ offset:0x646
+ offset:0x64b
+ offset:0x65c
+ offset:0x6df
+ offset:0x590
+default action
+ offset:0x6eb
+```
+
+now run `afl-fuzz` to fuzz the library
+
+```
+mkdir in
+echo xxxx > in/1
+./afl-fuzz -i in -o out -- ./loader /data/local/tmp/libdemo.so @@
+```
+
+the snapshot
+
+![image-20191114222336674](assets/image-20191114222336674.png)
+
+good job. \ No newline at end of file
diff --git a/qbdi_mode/build.sh b/qbdi_mode/build.sh
index a45c76e6..7ac4c75d 100755
--- a/qbdi_mode/build.sh
+++ b/qbdi_mode/build.sh
@@ -1,12 +1,39 @@
-compiler_prefix="/home/hac425/workspace/android-standalone-toolchain-21-x86/bin/i686-linux-android-"
-CFLAGS="-Iusr/local/include/ -Lusr/local/lib/"
+if [ -z ${STANDALONE_TOOLCHAIN_PATH} ]; then
+ echo "please set the android-standalone-toolchain path in STANDALONE_TOOLCHAIN_PATH environmental variable"
+ echo "for example: "
+ echo " export STANDALONE_TOOLCHAIN_PATH=/home/android-standalone-toolchain-21/"
+ exit
+fi
-# for x86-64 android
-# compiler_prefix="/home/hac425/workspace/android-standalone-toolchain-21/bin/x86_64-linux-android-"
-# CFLAGS="-Iandroid-x64/usr/local/include/ -Landroid-x64/usr/local/lib/"
+if [ -z ${QBDI_SDK_PATH} ]; then
+ echo "please set the qbdi sdk path in QBDI_SDK_PATH environmental variable"
+ echo "for example: "
+ echo " export QBDI_SDK_PATH=/home/QBDI-Android/"
+ exit
+fi
+
+
+if [ "$1" = "x86" ]; then
+ echo "build x86 qbdi"
+ compiler_prefix="${STANDALONE_TOOLCHAIN_PATH}/bin/i686-linux-android-"
+elif [ "$1" = "x86_64" ]; then
+ echo "build x86_64 qbdi"
+ compiler_prefix="${STANDALONE_TOOLCHAIN_PATH}/bin/x86_64-linux-android-"
+else
+ echo "usage: ./build.sh arch[x86, x86_64]"
+ exit
+fi
+
+
+CFLAGS="-I${QBDI_SDK_PATH}/usr/local/include/ -L${QBDI_SDK_PATH}/usr/local/lib/"
+
+# build the qbdi template
${compiler_prefix}g++ -o loader template.cpp -lQBDI -ldl -w -g ${CFLAGS}
+
+# build the demo share library
${compiler_prefix}gcc -shared -o libdemo.so demo-so.c -w -g
+# build afl-fuzz
cd ..
${compiler_prefix}gcc -O3 -funroll-loops -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -I include/ -DAFL_PATH=\"/usr/local/lib/afl\" -DBIN_PATH=\"/usr/local/bin\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -Wno-unused-function src/afl-fuzz-misc.c src/afl-fuzz-extras.c src/afl-fuzz-queue.c src/afl-fuzz-one.c src/afl-fuzz-python.c src/afl-fuzz-stats.c src/afl-fuzz-init.c src/afl-fuzz.c src/afl-fuzz-bitmap.c src/afl-fuzz-run.c src/afl-fuzz-globals.c src/afl-common.c src/afl-sharedmem.c src/afl-forkserver.c -o qbdi_mode/afl-fuzz -ldl -w
diff --git a/qbdi_mode/demo-so.c b/qbdi_mode/demo-so.c
index 3ba7c449..5e74f268 100755
--- a/qbdi_mode/demo-so.c
+++ b/qbdi_mode/demo-so.c
@@ -1,46 +1,33 @@
#include <stdio.h>
-
-
// gcc -shared -o libdemo.so demo-so.c -w
-
-
-int target_func(char* buf, int size){
-
+int target_func(char *buf, int size)
+{
printf("buffer:%p, size:%p\n", buf, size);
-
switch (buf[0])
{
case 1:
puts("222");
- if(buf[1]=='\x44'){
- puts("aaaaaaaaaaaaaaaaaaaaa");
- *(char*)(0) = 1;
- }
- break;
- case '\xfe':
- // assert(0);
- if(buf[4]=='\xf0'){
- puts("xxxiiii");
+ if (buf[1] == '\x44')
+ {
+ puts("null ptr deference");
+ *(char *)(0) = 1;
}
break;
case 0xff:
- if(buf[2]=='\xff'){
- if(buf[1]=='\x44'){
- *(char*)(0xdeadbeef) = 1;
- }else{
- puts("kkkkkk");
+ if (buf[2] == '\xff')
+ {
+ if (buf[1] == '\x44')
+ {
+ puts("crash....");
+ *(char *)(0xdeadbeef) = 1;
}
}
- puts("xxxx");
break;
default:
- puts("xxxxxxx");
+ puts("default action");
break;
}
return 1;
}
-
-
-
diff --git a/qbdi_mode/template.cpp b/qbdi_mode/template.cpp
index 85b46d2f..f0b0c601 100755
--- a/qbdi_mode/template.cpp
+++ b/qbdi_mode/template.cpp
@@ -18,9 +18,6 @@
#include <sys/shm.h>
#include "../config.h"
-
-
-
#include <QBDI.h>
using namespace QBDI;
@@ -33,20 +30,21 @@ target_func p_target_func = NULL;
rword module_base = 0;
rword module_end = 0;
static unsigned char
- dummy[MAP_SIZE]; /* costs MAP_SIZE but saves a few instructions */
-unsigned char *afl_area_ptr = NULL; /* Exported for afl_gen_trace */
+ dummy[MAP_SIZE]; /* costs MAP_SIZE but saves a few instructions */
+unsigned char *afl_area_ptr = NULL; /* Exported for afl_gen_trace */
unsigned long afl_prev_loc = 0;
-
/* Set up SHM region and initialize other stuff. */
-int afl_setup(void) {
+int afl_setup(void)
+{
char *id_str = getenv(SHM_ENV_VAR);
int shm_id;
- if (id_str) {
+ if (id_str)
+ {
shm_id = atoi(id_str);
- afl_area_ptr = (unsigned char*)shmat(shm_id, NULL, 0);
+ afl_area_ptr = (unsigned char *)shmat(shm_id, NULL, 0);
if (afl_area_ptr == (void *)-1)
return 0;
memset(afl_area_ptr, 0, MAP_SIZE);
@@ -54,7 +52,6 @@ int afl_setup(void) {
return 1;
}
-
/* Fork server logic, invoked once we hit _start. */
static void afl_forkserver()
{
@@ -74,7 +71,6 @@ static void afl_forkserver()
if (read(FORKSRV_FD, &was_killed, 4) != 4)
exit(2);
-
child_pid = fork();
if (child_pid < 0)
exit(4);
@@ -101,25 +97,28 @@ static void afl_forkserver()
}
}
-void afl_maybe_log(unsigned long cur_loc) {
- if(afl_area_ptr == NULL){
- return;
- }
- unsigned long afl_idx = cur_loc ^ afl_prev_loc;
- afl_area_ptr[afl_idx % MAP_SIZE]++;
- afl_prev_loc = cur_loc >> 1;
+void afl_maybe_log(unsigned long cur_loc)
+{
+ if (afl_area_ptr == NULL)
+ {
+ return;
+ }
+ unsigned long afl_idx = cur_loc ^ afl_prev_loc;
+ afl_area_ptr[afl_idx % MAP_SIZE]++;
+ afl_prev_loc = cur_loc >> 1;
}
-char* read_file(char* path, unsigned long* length) {
- FILE *pFile = fopen(path, "rb");
- char *pBuf;
- fseek(pFile, 0, SEEK_END);
- unsigned long len = ftell(pFile);
- pBuf = (char*)malloc(len);
- rewind(pFile);
- fread(pBuf, 1, len, pFile);
- fclose(pFile);
- *length = len;
- return pBuf;
+char *read_file(char *path, unsigned long *length)
+{
+ FILE *pFile = fopen(path, "rb");
+ char *pBuf;
+ fseek(pFile, 0, SEEK_END);
+ unsigned long len = ftell(pFile);
+ pBuf = (char *)malloc(len);
+ rewind(pFile);
+ fread(pBuf, 1, len, pFile);
+ fclose(pFile);
+ *length = len;
+ return pBuf;
}
char FPATH[200];
@@ -127,24 +126,21 @@ char FPATH[200];
QBDI_NOINLINE int fuzz_func()
{
- if(afl_setup()){
+ if (afl_setup())
+ {
afl_forkserver();
}
unsigned long len = 0;
- char* data = read_file(FPATH, &len);
+ char *data = read_file(FPATH, &len);
printf("In fuzz_func\n");
p_target_func(data, len);
return 1;
}
-
-
-
-
-
-static QBDI::VMAction bbcallback(QBDI::VMInstanceRef vm, const QBDI::VMState *state, QBDI::GPRState *gprState, QBDI::FPRState *fprState, void *data) {
+static QBDI::VMAction bbcallback(QBDI::VMInstanceRef vm, const QBDI::VMState *state, QBDI::GPRState *gprState, QBDI::FPRState *fprState, void *data)
+{
// errno = SAVED_ERRNO;
#ifdef __x86_64__
@@ -154,9 +150,11 @@ static QBDI::VMAction bbcallback(QBDI::VMInstanceRef vm, const QBDI::VMState *st
#elif defined(__arm__)
unsigned long pc = gprState->pc;
#endif
-
- if(pc >= module_base && pc <= module_end){
- unsigned long offset = pc - module_base;
+
+ // just log the module path
+ if (pc >= module_base && pc <= module_end)
+ {
+ unsigned long offset = pc - module_base;
printf("\toffset:%p\n", offset);
afl_maybe_log(offset);
}
@@ -166,6 +164,12 @@ static QBDI::VMAction bbcallback(QBDI::VMInstanceRef vm, const QBDI::VMState *st
int main(int argc, char **argv)
{
+ if (argc < 3)
+ {
+ puts("usage: ./loader library_path input_file_path");
+ exit(0);
+ }
+
const char *lib_path;
lib_path = argv[1];
// FPATH = argv[2];
@@ -183,9 +187,9 @@ int main(int argc, char **argv)
lib_name = strrchr(lib_name, '/') + 1;
// printf("library name:%s\n", lib_name);
-
+ // load library module address for log path
for (MemoryMap &map : getCurrentProcessMaps())
- {
+ {
// printf("module:%s\n", map.name.c_str());
if ((map.permission & PF_EXEC) && strstr(map.name.c_str(), lib_name) != NULL)
{
@@ -212,10 +216,8 @@ int main(int argc, char **argv)
vm.addInstrumentedModuleFromAddr(module_base);
vm.addInstrumentedModuleFromAddr((rword)&main);
-
vm.addVMEventCB(BASIC_BLOCK_ENTRY, bbcallback, nullptr);
-
// QBDI::simulateCall(state, FAKE_RET_ADDR);
// vm.run((rword)&fuzz_func, (rword)FAKE_RET_ADDR);