Cargando…

Fuzzing Against the Machine Automate Vulnerability Research with Emulated IoT Devices on QEMU /

Find security flaws in any architecture effectively through emulation and fuzzing with QEMU and AFL Purchase of the print or Kindle book includes a free PDF eBook Key Features Understand the vulnerability landscape and useful tools such as QEMU and AFL Explore use cases to find vulnerabilities and e...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Nappa, Antonio (Autor), Blázquez, Eduardo (Autor)
Otros Autores: Bassen, Nikias (writer of foreword.), López-Gómez, Javier (writer of foreword.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2023.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1378391255
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 230506s2023 enk o 000 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d YDX  |d UKAHL  |d ORMDA  |d EBLCP  |d OCLCF  |d OCLCQ  |d IEEEE  |d OCLCO 
019 |a 1378382360 
020 |a 9781804614228 
020 |a 180461422X 
020 |z 1804614971 
020 |z 9781804614976 
035 |a (OCoLC)1378391255  |z (OCoLC)1378382360 
037 |a 9781804614976  |b O'Reilly Media 
037 |a 10251323  |b IEEE 
050 4 |a TK5105.8857 
082 0 4 |a 004.67/8  |2 23/eng/20230524 
049 |a UAMI 
100 1 |a Nappa, Antonio,  |e author. 
245 1 0 |a Fuzzing Against the Machine  |h [electronic resource] :  |b Automate Vulnerability Research with Emulated IoT Devices on QEMU /  |c Antonio Nappa, Eduardo Blázquez ; foreword by Nikias Bassen, Dr. Javier López-Gómez. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2023. 
300 |a 1 online resource (238 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title Page -- Copyright and Credits -- Dedications -- Forewords -- Contributors -- Table of Contents -- Preface -- Part 1: Foundations -- Chapter 1: Who This Book is For -- Who is this book for? -- Prerequisites -- A custom journey -- Getting a primer -- The utility belt -- Ladies and gentlemen, start your engines -- QEMU basic instrumentation -- OpenWrt full system emulation -- Samsung Exynos baseband -- iOS and Android -- Summary -- Chapter 2: History of Emulation -- What is emulation? -- Why is emulation needed? -- Differences between emulation and virtualization 
505 8 |a Emulation besides QEMU -- MAME -- Bochs -- RetroPie -- The role of emulation and virtualization in cybersecurity through history -- Anubis -- TEMU -- Ether -- The Cuckoo sandbox -- Commercial solutions -- VirusTotal and Joe Sandbox -- Summary -- Chapter 3: QEMU From the Ground -- Approaching IoT devices with emulation -- Code structure -- QEMU emulation -- QEMU IR -- A deep-dive into QEMU architecture -- QEMU extensions and mods -- A brief example of Avatar2 -- PANDA -- Summary -- Part 2: Emulation and Fuzzing -- Chapter 4: QEMU Execution Modes and Fuzzing -- QEMU user mode 
505 8 |a QEMU full-system mode -- Fuzzing and analysis techniques -- The Rosetta Stone of program semantics -- Fuzzing techniques -- American Fuzzy Lop and American Fuzzy Lop++ -- Advantages of AFL and AFL++ versus my own fuzzer -- Fuzzing with AFL and AFL++ -- Fuzzing ARM binaries -- Summary -- Chapter 5: A Famous Refrain: AFL + QEMU = CVEs -- Is it so easy to find vulnerabilities? -- Downloading and installing AFL++ -- Preparing a vulnerable VLC instance -- VLC exploit -- Full-system fuzzing -- introducing TriforceAFL -- Passing inputs to the guest system -- Summary -- Further reading -- Appendix 
505 8 |a Chapter 6: Modifying QEMU for Basic Instrumentation -- Adding a new CPU -- Emulating an embedded firmware -- Reverse engineering DMA peripherals -- Emulating UART with Avatar2 for firmware debugging -- visualizing output -- Summary -- Part 3: Advanced Concepts -- Chapter 7: Real-Life Case Study: Samsung Exynos Baseband -- A crash course on mobile phone architecture -- Baseband -- Baseband CPU family -- Application processor and baseband interface -- A talk with Shannon -- A note on GSM/3GPP/LTE protocol specifications -- Setting up FirmWire for vulnerability validation 
505 8 |a CVE-2020-25279 -- emulator fuzzing -- CVE-2020-25279 -- OTA exploitation -- Summary -- Chapter 8: Case Study: OpenWrt Full-System Fuzzing -- OpenWrt -- Building the firmware -- Testing the firmware in QEMU -- Extracting and preparing the kernel -- Fuzzing the kernel -- Post-crash core dump triaging -- Summary -- Chapter 9: Case Study: OpenWrt System Fuzzing for ARM -- Emulating the ARM architecture to run an OpenWrt system -- Installing TriforceAFL for ARM -- Running TriforceAFL in OpenWrt for ARM -- Obtaining a crash -- Summary -- Chapter 10: Finally Here: iOS Full System Fuzzing 
500 |a A brief history of iOS emulation 
520 |a Find security flaws in any architecture effectively through emulation and fuzzing with QEMU and AFL Purchase of the print or Kindle book includes a free PDF eBook Key Features Understand the vulnerability landscape and useful tools such as QEMU and AFL Explore use cases to find vulnerabilities and execute unknown firmware Create your own firmware emulation and fuzzing environment to discover vulnerabilities Book Description Emulation and fuzzing are among the many techniques that can be used to improve cybersecurity; however, utilizing these efficiently can be tricky. Fuzzing Against the Machine is your hands-on guide to understanding how these powerful tools and techniques work. Using a variety of real-world use cases and practical examples, this book helps you grasp the fundamental concepts of fuzzing and emulation along with advanced vulnerability research, providing you with the tools and skills needed to find security flaws in your software. The book begins by introducing you to two open source fuzzer engines: QEMU, which allows you to run software for whatever architecture you can think of, and American fuzzy lop (AFL) and its improved version AFL++. You'll learn to combine these powerful tools to create your own emulation and fuzzing environment and then use it to discover vulnerabilities in various systems, such as iOS, Android, and Samsung's Mobile Baseband software, Shannon. After reading the introductions and setting up your environment, you'll be able to dive into whichever chapter you want, although the topics gradually become more advanced as the book progresses. By the end of this book, you'll have gained the skills, knowledge, and practice required to find flaws in any firmware by emulating and fuzzing it with QEMU and several fuzzing engines. What you will learn Understand the difference between emulation and virtualization Discover the importance of emulation and fuzzing in cybersecurity Get to grips with fuzzing an entire operating system Discover how to inject a fuzzer into proprietary firmware Know the difference between static and dynamic fuzzing Look into combining QEMU with AFL and AFL++ Explore Fuzz peripherals such as modems Find out how to identify vulnerabilities in OpenWrt Who this book is for This book is for security researchers, security professionals, embedded firmware engineers, and embedded software professionals. Learners interested in emulation, as well as software engineers interested in vulnerability research and exploitation, software testing, and embedded software development will also find it useful. The book assumes basic knowledge of programming (C and Python); operating systems (Linux and macOS); and the use of Linux shell, compilation, and debugging. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internet of things  |x Security measures  |x Research  |x Methodology. 
650 0 |a Fuzzy algorithms. 
650 6 |a Internet des objets  |x Sécurité  |x Mesures  |x Recherche  |x Méthodologie. 
650 6 |a Algorithmes flous. 
650 7 |a Fuzzy algorithms  |2 fast 
700 1 |a Blázquez, Eduardo,  |e author. 
700 1 |a Bassen, Nikias,  |e writer of foreword. 
700 1 |a López-Gómez, Javier,  |e writer of foreword. 
776 0 8 |i Print version:  |a Nappa, Antonio  |t Fuzzing Against the Machine  |d Birmingham : Packt Publishing, Limited,c2023  |z 9781804614976 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781804614976/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH41151086 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30518028 
938 |a YBP Library Services  |b YANK  |n 305321501 
994 |a 92  |b IZTAP