Search This Blog

Thursday, November 01, 2007

[TOOL] Bunny The Fuzzer

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


- - - - - - - - -

Bunny The Fuzzer
------------------------------------------------------------------------


SUMMARY

DETAILS

Bunny uses automatically generated C-level instrumentation to focus on
runtime inputs observed to trigger new control flow paths or interesting
parameter variations - and to bail out early on dead-end fuzzing routes.

This notably improves flow path coverage and overall quality of the
fuzzing process.

The tool is designed to maintain a near-native execution speed, and
requires virtually no setup, even when dealing with complex and large
codebases. This is probably a major improvement over previous closed loop
solutions.

The software should be reasonably stable, though some bugs might still
need to be ironed out.


ADDITIONAL INFORMATION

The information has been provided by <mailto:lcamtuf@dione.cc> Michal
Zalewski.
To keep updated with the tool visit the project's homepage at:
<http://code.google.com/p/bunny-the-fuzzer/wiki/BunnyDoc>

http://code.google.com/p/bunny-the-fuzzer/wiki/BunnyDoc

========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

No comments: