37C3 - Fuzzing the TCP/IP stack

  Рет қаралды 4,433

media.ccc.de

media.ccc.de

2 ай бұрын

media.ccc.de/v/37c3-12235-fuz...
beyond the trivial
In this talk, we delve into the captivating realm of TCP/IP stack fuzzing. As the backbone of internet communication, the TCP/IP stack is a prime target for cyber threats. This presentation will unravel the intricacies of fuzzing techniques applied to several TCP/IP stacks, shedding light on how these methodologies can uncover bugs, crashes and vulnerabilities. From the fundamentals of packet fuzzing to advanced mutation strategies, attendees will gain valuable insights into the proactive ways to fuzz a TCP/IP stack. Whether you're a seasoned cybersecurity professional or a curious enthusiast, this talk promises to be an enlightening journey into the heart of TCP/IP stack security and the crucial role of fuzzing in safeguarding our interconnected world.
Our exploration begins with an honest appraisal of traditional fuzzing methodologies that have been applied to TCP/IP stacks before, like ISIC, revealing their inherent limitations, e.g., they can't reach beyond the TCP initial state. Recognizing the need for a more evolved approach, we take a different approach, where we leverage a full-blow active network connection for fuzzing. A key revelation in this journey is the deliberate decision to sidestep the arduous task of constructing a custom TCP/IP stack, a choice rooted in practical considerations.
The reluctance to build a bespoke TCP/IP stack leads us to innovative strategies such as embedding hooks in the Linux kernel and tapping into userland TCP/IP stacks like PyTCP, Netstack (part of Google gVisor), and PicoTCP. PicoTCP takes center stage, offering a userland TCP/IP stack that becomes integral to our state fuzzing methodology. Attendees will gain a deeper understanding of its architecture, APIs, and documentation, appreciating its pivotal role in fortifying network security.
As the presentation unfolds, we navigate through the development of a powerful fuzzer, a core element in our approach to identifying vulnerabilities within the TCP/IP stack. The intricacies of driving traffic through the system, simulating real-world scenarios, and leveraging reproducibility and diagnostics techniques are revealed. The discussion expands to showcase tangible results, including trophies obtained, bugs reported, and the eventual release of the project on GitHub. The session concludes with an engaging Q & A, encouraging participants to delve into the intricacies of TCP/IP stack fuzzing and its profound implications for network security.
Ilja van Sprundel
events.ccc.de/congress/2023/h...
#37c3 #Security

Пікірлер: 3
@nanothrill7171
@nanothrill7171 2 ай бұрын
i like picturing the various layers inside the tcp stack as a bunch of little guys
@gentlevandal7589
@gentlevandal7589 2 ай бұрын
I'm curious if we can use XDP for the same thing but can't see a work on it
@guiorgy
@guiorgy 2 ай бұрын
Doesn't look like the git repo went anywhere since then, but still wish him good luck
37C3 -  Finding Vulnerabilities in Internet-Connected Devices
47:22
media.ccc.de
Рет қаралды 25 М.
когда одна дома // EVA mash
00:51
EVA mash
Рет қаралды 11 МЛН
Кәріс тіріма өзі ?  | Synyptas 3 | 8 серия
24:47
kak budto
Рет қаралды 1,6 МЛН
Transport Layer Security (TLS) - Computerphile
15:33
Computerphile
Рет қаралды 464 М.
37C3 -  Tractors, Rockets and the Internet in Belarus
43:05
media.ccc.de
Рет қаралды 8 М.
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
leyrer: E-Ausweis - Nein, nicht der mit dem Strom
1:00:57
media.ccc.de
Рет қаралды 28 М.
Cybersecurity Architecture: Application Security
16:36
IBM Technology
Рет қаралды 46 М.
How To Protect Your Linux Server From Hackers!
20:38
LiveOverflow
Рет қаралды 292 М.
37C3 -  Reconstructing game footage from a Game Boy's memory bus
1:01:12
когда одна дома // EVA mash
00:51
EVA mash
Рет қаралды 11 МЛН