Quantcast
Channel: Penetration Test – Security List Network™
Viewing all articles
Browse latest Browse all 1152

rage_fuzzer – a dumb protocol-unaware packet fuzzer/replayer.

$
0
0

rage against the network is a dumb protocol-unaware packet fuzzer/replayer.
Basic ideas:
* ridiculously easy to use (near-zero setup cost)
* protocol-unaware; blind brute-force fuzzing
* fairly quick (todo: proper epoll)
* comes with a collection of packets for common protocols ready to go

rage_fuzzer

rage network dumbfuzzer

Current status:
+ IP only (TCP and UDP)
+ Client-side only
+ not particularly fast (single-thread blocking)
+ deterministic; fuzz-runs can be repeated given the seed of a prior run
+ target process monitoring is left as an excersize to the reader
+ naive unconfigurable mutations

Usage & download from git:

git clone https://github.com/deanjerkovich/rage_fuzzer && cd rage_fuzzer
make
./rage -h

Source: https://github.com/deanjerkovich


Viewing all articles
Browse latest Browse all 1152

Trending Articles