Главная
Study mode:
on
1
Introduction
2
Outline
3
Why Fuzzing
4
Why BSD
5
File System Structure
6
Why Not Use LAX
7
First Test Case
8
Mutation
9
Metadata
10
Observations
11
User Emulation
12
User Emulation Commands
13
ZFS
14
Monitoring
15
Verification
16
Core Features
17
Results
18
Findings
19
Boot Times
20
Netdom
21
Lip OS
22
Conclusions
23
Demo
Description:
Explore advanced techniques for fuzzing file system implementations to uncover security vulnerabilities in this comprehensive conference talk from the Hack In The Box Security Conference. Delve into the growing field of vulnerability research and fuzz-testing, focusing on file systems as an often overlooked component in both offensive and defensive security. Learn how to develop general guidelines for efficiently approaching this area of research by identifying potential attack surfaces. Gain insights into automating fuzzing processes for kernel file system implementations, with a particular emphasis on BSD-based systems. Discover the speaker's methodology for evaluating the robustness of established and newer file systems, including the use of mutation, metadata analysis, and user emulation. Examine specific case studies involving ZFS, and understand the importance of monitoring, verification, and core feature testing in the fuzzing process. Conclude with a discussion of key findings, their impact on boot times and network domains, and a live demonstration of the techniques presented. Read more

Fuzzing File System Implementations to Uncover Security Bugs

Hack In The Box Security Conference
Add to list