
Dailydave mailing list archives
Re: Cloud fuzzing.
From: Billy Lee <romemeteor () gmail com>
Date: Thu, 14 May 2009 09:13:23 +0800
hi, all It's a good morning and welcome all of buddies on this Syscan 09@Shanghai, Things usually work out fine, but it is rather difficult for me because it's not my normal routine. As opposed to just discussing the vulnerabilities, like tracing the rootkit behaviors with BCE etc. and hacking VMware, I have to worry about one question: Should 0Day Vulnerabilities be TRADED. What's the ultimate answer for us, as the security enablers, to deal with the 0Day attacks for our potential customers? If yes, we must pay a big bunch of money to get the details in an "legal" way; if not, we've to get a risky dark world to fight with a poor gun....? Is that true, it is really difficult to make choices. :( Maybe...or perhaps we could incorporate and facilitate coordination of all the security resources to reduce the attack surface, but it is still an endless war. Wish to enjoy the Shanghai trips, security guys. If you need any help in Shanghai, please contact me: Billy.Lee romemeteor () gmail com Skype: meteorshow Antiy Labs http://www.antiy.net http://www.antiy.com On Wed, May 13, 2009 at 11:10 PM, Dave Aitel <dave () kof immunityinc com> wrote:
He's doing pretty deep format aware fuzzing, from what I can tell. But you still will get false positives (as measured by "obviously exploitable bugs" versus "obviously not exploitable bugs") -dave On Wed, May 13, 2009 at 3:42 AM, Matt Oh <oh.jeongwook () gmail com> wrote:Nagy works at COSEINC? He was my former colleage :) Anyway, I'm just curious he was doing format-aware fuzzing or just brute forcing all the bytes and dwords of the file. In the previous case, the FP rate will drop drastically compared to second one. On Tue, May 12, 2009 at 11:12 PM, Dave Aitel <dave () kof immunityinc com> wrote:Today at SyScan Ben Nagy of COSEINC gave a talk on a fuzzing cluster he's built that does 1.2 million fuzz cases a day against Word 2007. As he mentioned, as software gets better, the problem shifts from fuzz case generation to crash analysis. If you're generating 200K crashes a day, you need to figure out which ones are "interesting". In the long run, the only answer is a program that writes real exploits. Only then can you say for sure something is "interesting". He's using !exploitable for WinDBG to get an approximation of the problem. It's a talk full of real metrics. 72 VM's doing Word 20 test cases run a second 10% cause crashes or so. Most of those are unexploitable (he had numbers, but I forget them), according to !exploitable. A small percentage say they are possibly exploitable, and out of those, largely false positives. The problem of fuzzing is exponential, but if you architect your fuzzer right, you can scale linearly with your budget. Perhaps your budget also grows exponentially? :> The problems for the future are interesting. Classification of potential exploitability is a problem that involves diffing program runs, examining programs deeply for structure and behavior, and all this has to scale up with your 200K cases a day. -dave _______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave-- -matt_______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave
_______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave
Current thread:
- Cloud fuzzing. Dave Aitel (May 13)
- Re: Cloud fuzzing. Matt Oh (May 13)
- Re: Cloud fuzzing. Dave Aitel (May 13)
- Re: Cloud fuzzing. Billy Lee (May 14)
- Re: Cloud fuzzing. Dave Aitel (May 13)
- Re: Cloud fuzzing. Ben Nagy (May 22)
- Re: Cloud fuzzing. Matt Oh (May 13)