Advanced Fuzzing League

714 Followers
10 Following
83 Posts

We want to make fuzzing better and better

Follow for updates on AFL++ & LibAFL

LibAFLhttps://github.com/AFLplusplus/LibAFL
AFL++https://github.com/AFLplusplus/AFLplusplus
webhttps://aflplus.plus
blueskyhttps://bsky.app/profile/aflplusplus.bsky.social
AFL++ v4.40c release - best performance ever - optimal hidden coverage instrumentation, FrameShift, LLVM 22 support, IJON fixes, a lot of minor and bigger enhancements! #fuzzer #fuzzing https://github.com/AFLplusplus/AFLplusplus/releases/tag/v4.40c
Release v4.40c · AFLplusplus/AFLplusplus

Version ++4.40c (release) afl-fuzz: FrameShift integrated and enabled by default, disable with AFL_FRAMESHIFT_DISABLE and configure effort via AFL_FRAMESHIFT_MAX_OVERHEAD. In extensive fuzzbench ...

GitHub
Wanna learn more about #fuzzing? The AFL++ community has moved to Zulip: https://fuzz.zulipchat.com

Come join us!
#LeaveDiscord
Awesome Fuzzing

Zulip for the AFL++ and broader fuzzing community.

Zulip

#Rams #RainbowWool #Wool #BaRamEwe

One out of 12 rams (male sheep) is uninterested in females and prefers the company of males. They are deemed “non-procreative” (worthless to a farmer) and sent to slaughter. So this German farmer, Michael Stücke, rescues the gay rams and forms the company Rainbow Wool, selling wool from the gay sheep. Collaboration between Rainbow Wool and Grindr resulted in a fashion show called I Wool Survive. It featured 36 unique looks by designer Michael Schmidt, made entirely from the wool of the gay sheep, and celebrating queer identity through knitted and crocheted archetypes like Fireman, Sailor, Jock, Daddy and more. Proceeds from sales went to LGBTQA charitable organizations.
In a culture of Stephen Miller and Peter Thiel, be a Michael Stücke or a Michael Schmidt. Make art, make beautiful things, make people laugh, promote inclusivity, promote fabulousness- and find a way to accept whatever you consider “useless sheep.” Maybe instead of killing them, help them become Rainbow Wool. RESIST. And do it in style, if you can.

https://rainbow-wool.com/

Rainbow Wool

Rainbow Wool is the first fashion made from the wool of gay sheep to support queer projects across the globe. #🌈🐏

Rainbow Wool Shop
AFL++ 4.35c release! Complete hidden coverage gathering, GUIFuzz++ support, IJON for qemu, various fixes! https://github.com/AFLplusplus/AFLplusplus/releases/tag/v4.35c #fuzzing #fuzzer
Release v4.35c · AFLplusplus/AFLplusplus

Version ++4.35a (release) GUIFuzz++ merged: Unleashing Grey-box Fuzzing on Desktop Graphical User Interfacing Applications https://futures.cs.utah.edu/papers/25ASE.pdf afl-fuzz: fix syncing issue...

GitHub

When seven German journalist students do a better job of tracking down the sources of the drone flights over Europe than the security services...

https://www.digitaldigging.org/p/they-droned-back

They Droned Back

Young journalists expose Russian-linked vessels circling off the Dutch and German coast

Digital Digging with Henk van Ess

Ebury Version 1.8.2.e6

Memory dump from live processes now available (sshd and systemd-udev). De-crypted and De-obfuscated. Enjoy.

@GrapheneOS is being threatened by French authorities for refusing to add backdoors and they're dealing with coordinated attacks in French media right now. They're pulling out of France entirely, moving all their servers, and fighting off a wave of bullshit one-sided reporting that makes them look like they're helping criminals.

They need us to fight back. Support them however you can, whether that's a dollar, sharing their story, pushing back on the garbage news coverage when you see it, or just telling someone you know about what's happening. All of it matters because they're drowning in attacks from governments and media and bad actors who want them gone.

This is the only Android OS that actually makes me feel like privacy isn't just marketing. They fight for us now they need us to fight for them.

The EU is pushing Chat Control and creating an environment where governments feel empowered to threaten developers into compliance, and if we stay quiet we're letting it happen. Show up for them in whatever way you're able to.

#grapheneos #Privacy #NoBackdoors #encryption #security #chatControl

About 1.5 years ago my friend was (falsely) accused of terrorism.

All of their electronic devices were seized, plus my stash of hard drives (stored at their place for reasons).

Of course police didn’t find any evidence. Culprit that impersonated my friend (and many others) got arrested recently (article in Polish).

Police returned the hardware few months ago and I found that all of my drives are now e-waste thanks to their carelessness, which made me (understandably) furious. I even considered suing them.

Said very good friend of mine entrusted me with their personal phone and pattern to unlock it. I charged and booted it for the first time since February 2024 and were curious how it was pwned. I knew police used cellebrite on it.

My crime is that of curiosity

As it turns out, police forgot to clean after themselves (there was an attempt) and left payloads, logs, and backdoor intact.

Took a peek at the first-stage payload but it’s too complex for me to reverse-engineer on my own. It’s relatively well obfuscated, but I can tell it’s using RNDIS (likely spawning a server?) and TLS-encrypted connection to talk to Cellebrite box.

If you’re a security researcher (or just curious nerd with more spoons than me) and you would like to take a look - here you go.

Payload was uploaded onto the device on 2024-02-21. If you want to re-create the environment it was executed on, you will need a:

  • Samsung Z Flip3 5G (SM-F711B)
  • Android build SP2A_220305.013.F711BXXS2CVHF

Rough execution flow:

1. USB device plugged in (Cellebrite Cheetah) 2. USB controller switches to host mode 3. Gadget switching USB VID/PID to load kernel modules (hid_steam, hid_apple, hid_prodikeys, hid_logitech_hidpp, hid_magicmouse, hid_aksys and tries to exploit quirks) 4. Module 'hid_aksys' leaks memory 5. Screen unlocked 6. ADB key '82:E5:EA:F3:DC:D1:7D:CA:65:3C:D4:58:65:CD:81:8E' added to trusted keys on the device 7. First-stage payload '/data/local/tmp/falcon' copied onto the device. 8. Second-stage payload (seemingly) executed as root: - /data/local/tmp/chrome-command-line - /data/local/tmp/android-webview-command-line - /data/local/tmp/webview-command-line - /data/local/tmp/content-shell-command-line - /data/local/tmp/frida-server-16.1.4-android-arm64 - /data/local/tmp/init 9. Data extraction (photos, telegram, firefox, downloads)

Have fun!

Słynny bomber zatrzymany – ogromny sukces organów ścigania | Zaufana Trzecia Strona

Prokuratura Regionalna w Poznaniu oraz poznańskie CBZC ogłosiły właśnie wielki sukces - udało się znaleźć i zatrzymać sprawcę mnóstwa alarmów bombowych, który bezkarnie działał od…

Zaufana Trzecia Strona

LibAFL 0.15.4 has just been released 🎉

Of the 30 Contributers for this release, almost half are new faces <3

https://github.com/AFLplusplus/LibAFL/releases/tag/0.15.4

#Fuzzing #LibAFL #AFLplusplus

Got angry, posted about academic fuzzing research status quo again: https://addisoncrump.info/research/what-the-hell-are-we-doing/
What the hell are we doing? · Addison Crump

Homepage for Addison Crump