Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
暫譯: 對抗機器的模糊測試:使用 QEMU 模擬 IoT 裝置自動化漏洞研究
Nappa, Antonio, Blázquez, Eduardo
- 出版商: Packt Publishing
- 出版日期: 2023-05-19
- 售價: $2,030
- 貴賓價: 9.5 折 $1,929
- 語言: 英文
- 頁數: 238
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1804614971
- ISBN-13: 9781804614976
-
相關分類:
物聯網 IoT
海外代購書籍(需單獨結帳)
相關主題
商品描述
Find security flaws in any architecture effectively through emulation and fuzzing with QEMU and AFL
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
- Understand the vulnerability landscape and useful tools such as QEMU and AFL
- Explore use cases to find vulnerabilities and execute unknown firmware
- Create your own firmware emulation and fuzzing environment to discover vulnerabilities
Book Description
Emulation and fuzzing are among the many techniques that can be used to improve cybersecurity; however, utilizing these efficiently can be tricky. Fuzzing Against the Machine is your hands-on guide to understanding how these powerful tools and techniques work. Using a variety of real-world use cases and practical examples, this book helps you grasp the fundamental concepts of fuzzing and emulation along with advanced vulnerability research, providing you with the tools and skills needed to find security flaws in your software.
The book begins by introducing you to two open source fuzzer engines: QEMU, which allows you to run software for whatever architecture you can think of, and American fuzzy lop (AFL) and its improved version AFL++. You'll learn to combine these powerful tools to create your own emulation and fuzzing environment and then use it to discover vulnerabilities in various systems, such as iOS, Android, and Samsung's Mobile Baseband software, Shannon. After reading the introductions and setting up your environment, you'll be able to dive into whichever chapter you want, although the topics gradually become more advanced as the book progresses.
By the end of this book, you'll have gained the skills, knowledge, and practice required to find flaws in any firmware by emulating and fuzzing it with QEMU and several fuzzing engines.
What you will learn
- Understand the difference between emulation and virtualization
- Discover the importance of emulation and fuzzing in cybersecurity
- Get to grips with fuzzing an entire operating system
- Discover how to inject a fuzzer into proprietary firmware
- Know the difference between static and dynamic fuzzing
- Look into combining QEMU with AFL and AFL++
- Explore Fuzz peripherals such as modems
- Find out how to identify vulnerabilities in OpenWrt
Who this book is for
This book is for security researchers, security professionals, embedded firmware engineers, and embedded software professionals. Learners interested in emulation, as well as software engineers interested in vulnerability research and exploitation, software testing, and embedded software development will also find it useful. The book assumes basic knowledge of programming (C and Python); operating systems (Linux and macOS); and the use of Linux shell, compilation, and debugging.
商品描述(中文翻譯)
找到任何架構中的安全漏洞,透過 QEMU 和 AFL 的模擬與模糊測試有效實現
購買印刷版或 Kindle 版書籍可獲得免費 PDF 電子書
主要特點
- 了解漏洞景觀及有用的工具,如 QEMU 和 AFL
- 探索用例以尋找漏洞並執行未知的韌體
- 創建自己的韌體模擬和模糊測試環境以發現漏洞
書籍描述
模擬和模糊測試是改善網路安全的眾多技術之一;然而,如何有效利用這些技術可能會很棘手。《Fuzzing Against the Machine》是您了解這些強大工具和技術如何運作的實用指南。這本書使用各種真實世界的用例和實際範例,幫助您掌握模糊測試和模擬的基本概念以及進階的漏洞研究,提供您發現軟體安全漏洞所需的工具和技能。
本書首先介紹兩個開源模糊測試引擎:QEMU,這是一個可以運行您所能想到的任何架構的軟體,以及美國模糊測試器(American fuzzy lop, AFL)及其改進版本 AFL++。您將學會如何結合這些強大的工具來創建自己的模擬和模糊測試環境,然後利用它來發現各種系統中的漏洞,例如 iOS、Android 和三星的移動基帶軟體 Shannon。在閱讀介紹並設置環境後,您將能夠深入任何您想要的章節,儘管隨著書籍的進展,主題會逐漸變得更為進階。
在本書結束時,您將獲得所需的技能、知識和實踐,以透過 QEMU 和幾個模糊測試引擎模擬和模糊測試任何韌體,從而找到漏洞。
您將學到的內容
- 了解模擬和虛擬化之間的區別
- 發現模擬和模糊測試在網路安全中的重要性
- 熟悉對整個作業系統進行模糊測試
- 探索如何將模糊測試器注入專有韌體
- 知道靜態模糊測試和動態模糊測試之間的區別
- 研究如何將 QEMU 與 AFL 和 AFL++ 結合
- 探索模糊測試外圍設備,如調製解調器
- 瞭解如何識別 OpenWrt 中的漏洞
本書適合誰
本書適合安全研究人員、安全專業人士、嵌入式韌體工程師和嵌入式軟體專業人士。對模擬感興趣的學習者,以及對漏洞研究和利用、軟體測試和嵌入式軟體開發感興趣的軟體工程師也會覺得這本書有用。本書假設讀者具備基本的程式設計知識(C 和 Python);作業系統(Linux 和 macOS);以及使用 Linux shell、編譯和除錯的能力。
目錄大綱
1. Who this book is for
2. History of emulation
3. Qemu from the ground
4. Qemu Execution Modes and Fuzzing
5. A Famous Refrain: AFL+QEMU = CVEs
6. Modifying QEMU for basic instrumentation
7. Real-life Case Study: Samsung Exynos Baseband
8. Case Study: OpenWRT full system fuzzing
9. Case Study: OpenWRT System Fuzzing for ARM
10. Finally Here: iOS Full System Fuzzing
11. Deus Ex Machina: Fuzzing Android Libraries
12. Conclusion and Final Remarks
目錄大綱(中文翻譯)
1. Who this book is for
2. History of emulation
3. Qemu from the ground
4. Qemu Execution Modes and Fuzzing
5. A Famous Refrain: AFL+QEMU = CVEs
6. Modifying QEMU for basic instrumentation
7. Real-life Case Study: Samsung Exynos Baseband
8. Case Study: OpenWRT full system fuzzing
9. Case Study: OpenWRT System Fuzzing for ARM
10. Finally Here: iOS Full System Fuzzing
11. Deus Ex Machina: Fuzzing Android Libraries
12. Conclusion and Final Remarks