Contents Menu Expand Light mode Dark mode Auto light/dark mode
kAFL
kAFL

Tutorials

  • Introduction
  • Installation
  • Concepts
  • Linux Target
    • DVKM
      • 1 - Target analysis
      • 2 - kAFL workflow
      • 3 - Building the agent
      • 4 - Fuzzing campaign
      • 5 - Exploring campaign results
      • 6 - Improvements: KASAN
    • Linux Kernel target
  • Windows Target
    • Driver
      • Target analysis
      • Windows VM Template
      • Provision the guest VM
      • Fuzzing Campaign
      • Crash Analysis
    • Userspace
      • Target analysis
      • Windows VM Template
      • Provision the guest VM
      • Fuzzing Campaign
      • Improvments

How-to guides

  • Github Actions CI/CD

Reference

  • Fuzzer Configuration
  • Deployment
  • kAFL/Nyx Hypercall API
  • kAFL Workdir
  • kAFL User Interface

Context

  • Research Papers

Development

  • Building the documentation
Back to top
Edit this page

Driver#

This tutorial will walk you through the steps to fuzz a driver on Windows.

Fuzzing a Windows driver

  • Target analysis
    • Objectives
    • Source code
    • Vulnerability
    • kAFL agent implementation
  • Windows VM Template
    • Setup the tooling
    • Build the Windows VM Template
    • Import the template into Vagrant
    • Import into libvirt
  • Provision the guest VM
  • Fuzzing Campaign
    • Running kafl fuzz
    • Follow the progress with kafl gui
  • Crash Analysis
    • Exploring the corpus
    • Locating the vulnerability
Next
Target analysis
Previous
Windows Target
Copyright © 2022, Steffen Schulz - Mathieu Tarral
Made with Sphinx and @pradyunsg's Furo