Some Fuzzing Strategies

Some Fuzzing Strategies#

The idea of fuzzing is to have inputs that are out of the ordinary, so we can detect errors in input parsers and beyond. But let us again have a look at the inputs we generated so far:

$ fandango fuzz -f persons.fan -n 10
Xfa Owgsml,83
Vwvad Kzyavk,9
Nvbznm Pmf,7
Pbbhf Xss,74
Nnhlm Fqrji,841
Jgovgm Jhih,3
Yxcx Ux,32
Xjfxjm Cfykjx,6
Youh Rztt,4
Rcczz Juc,059

Despite clearly looking non-natural to humans, the strings we generated so far are unlikely to trigger errors in a program, because programs typically treat all letters equally. So let us bring a bit more weirdness into our inputs.

Danger

Donā€™t feed such fuzz inputs into other peopleā€™s systems. In most countries, even trying will get you into jail.

Looooooong Inputs#

One way to increase the probability of detecting bugs is to test with long inputs. While processing data, many programs have limited storage for individual data fields, and thus need to cope with inputs that exceed this storage space. If programmers do not care for such long inputs, serious errors may follow. So-called buffer overflows have long been among the most dangerous vulnerabilities, as they can be exploited to gain unauthorized access to systems.

We can easily create long inputs by specifying the number of repetitions in our grammar:

  • Appending {N} to a symbol, where N is a number, makes Fandango repeat this symbol N times.

  • Appending {N,M} to a symbol makes Fandango repeat this symbol between N and M times.

  • Appending {N,} to a symbol makes Fandango repeat this symbol at least N times.

If, for instance, we want the above names to be 100 characters long, we can set up a new rule for <name>

<name> ::= <ascii_uppercase_letter><ascii_lowercase_letter>{99}

and the lowercase letters will be repeated 99 times.

This is the effect of this rule:

Nsuajooystcdhbtpcmllaqlhctojuadfmbstubzazsrpzniixhdsktxolztyvntcsmypjfkeahgbscfiqkgjjqaeqegxbwfwnkas Plogtauwiiadnecxgztbyhsfzvmpiynwfiwmbqrsiivegpfdhjfnvkfvtpkjyrgkgnjbhcmyhvyyddxbwdqvwnbcecrtoysokcwp,71
Glhuupiadhtdxbyhfdflakebruxdovngivtrmghvgwhjmjjwzbsbqoheoleocgnavbqijvzeifxedbnrecdmxhtxrwyeogtapofq Tslrrplzpwgcvkquqoljewnfwyooqirnxrlgpywcvtmacxlhtjezeguzkmwapbibxyotzswxguddespyspgrlrwrdufradgllwie,6
Smoyvzdoblnpsmbaciffylhcvgqciyhtvttainmrgmdtjocfwoafuplptfdfqtejhquadwpezhcimgywzsgjnddouckqvztklzpq Kjxjutvvrqrhufnoombgkecfkjowmxpyszjljzyeotqzvajyhfxjcgesvrushmtxsggbrkreprzdeyfhgsdoasfldseyfwqrdgub,36
Qoijgxghkyefyhvpyzhhcdflwwspcazwrxdwryeombztutxcvrximwgjhzljezhjcysrhplozmptxpfguelihxaxfybomidhwvjd Cfxmxewxuptvhyvkjiojvosbakbhgwltyxexkgenvhzfgaixlixbllyvzgjxptxffxfeirevthngurjsxquihqhhxvjpkvkidqne,1
Ohdiayqgsnailbbhvktyfuirnkwzlqolqfyfqlvwukyrcrnjtjtrimbzumrwbvwwwacemyxdzmkctjtpcftutrofqlgcqnbwdiyr Hljtmhgxfgvgbgzpydyxgbvdyjhlvfbzyxfoqqxvkytchydqkdghzqymrriothxdbobxxwvhhwaohvziaaapcskdttpiqkcmtwbx,36
Osfbjtkomlgybuzqeqanrnhoknmmioyovztmogjwefozjabmjldsoednckptrkpvxessfkkibcdhngwezbvkwartzvayuiqqzebd Qkbmsignsnipvmfcokrpkkdhmhjuruobpfjypbatermrmdhqfbekfzjehpppgcsxyyadjtfsucphgraklcuapfyqfxfjiqbkmfcl,49
Pyanauvhfqvtkpdtgroucbszodgdncvfntiwfzhtrosgoownlkyekqneqjqujdzzphaevhotncveamomkukgthfuicqrfrwllfuj Walpkzzvnzmsbgwcjnnemyvhsliultcfxqcaqtmiplmmdjjcntrdaszeavrcvrbrnxgpnubrzsksipbcxzlhklotvgrsgscpiwdz,01
Yffjxzhmeksjhhjfwtgfkveuqhondyfgjuddreopsfenlcsyzwwuxyndzvwlrsuyponiguhdaqmrhkkjhgokzlpmihnessokdpjm Mxussgpmmiwdjpyfajiyfaxtiihciqqvgetzhqxhijesuweyeuclnoaezlskdznluplhdfdzzkxxeymzudvmydshdauetjqhcmzi,89
Avmxvuhlhcgcvtgiyjouojoccytfojkdsllvfpmoqtkojfssgukdiejhhjsedacyujrsplatpjkrfpxevsjxmfxpfkdbpxbxpgec Tuvlfffqyqduaxyojffhoqvzrghowphuhvaqrsmrjhuqywqkjuafcgfseyikjtdadqnroozossmwekckwcrklavwjxubamrktmjw,53
Irhietzclniuhimittyptjzopnljjjkevhjymograrvpebwbswdiwnpdcmkitajgihynragilknbjnsjfoscwgkywhtxwwdnxflb Ukehjpvmqziduelhvtjjrwbqwybxpdptgpwxxvnxcpgxmvrjiqgacwzgqjonrgxienchdmnbirybeeghhszmfvbhajycrksrcvgf,00

We see that the names are now much longer. For real-world fuzzing, we may try even longer fields (say, 1,000) to test the limits of our system.

Note

Programmers often make ā€œoff-by-oneā€ errors, so if an input is specified to have at most N characters, you should test this exact boundary - say, by giving N and N+1 characters.

Danger

Donā€™t try this with other peopleā€™s systems.

Unusual Inputs#

Having ā€œweirdā€ inputs also applies to numerical values. Think about our ā€œageā€ field, for instance. What happens if we have a person with a negative age?

Try it yourself and modify persons.fan such that it can also produce negative numbers, as in

Vhxkhu Edybi,-66
Jyr Djqy,-378
Fkcl Dyof,4
Psarh Whoq,2799
Lhe Bl,86
Knprd Sdry,-565
Gpko Lqttu,4147
Ph Dmr,7
Qtfuzj Td,-1875
Iknjvj Pbl,6509

Did you succeed? Compare your answer against the solution below.

Other kinds of unusual inputs would be character sets that are out of the ordinary - for instance, Chinese or Hebrew characters - or plain Latin characters if your system expects Chinese names. A simple Emoji, for instance, could be enough to cause the system to fail.

For numbers, besides being out of range, there are a few constants that are interesting. Some common number parsers and converters accept values such as Inf (infinity) or NaN (not a number) as floating-point values. These actually are valid and have special rules ā€“ anything multiplied with Inf also becomes infinitely large (Inf times zero is zero, though); and any operation involving a NaN becomes NaN.

Imagine what happens if we manage to place a NaN value in a database? Any computation involving this value would also become a NaN, so in our example, the average age of persons would become NaN. The NaN could even go viral across Excel sheets, companies, shareholder reports, and eventually the stock market. Luckily, programs are prepared against that - or are they?

Danger

Donā€™t try this with other peopleā€™s systems.

String Injections#

Another kind of attack is to insert special strings into the input ā€“Ā strings that would be interpreted by the program not as data, but as commands. A typical example for this is a SQL injection. Many programs use the SQL, the structured query language, as a means to interact with databases. A command such as

INSERT INTO CUSTOMERS VALUES ('John Smith', 34);

would be used to save the values John Smith (name) and 34 (age) in the CUSTOMERS table.

A SQL injection uses specially formed strings and values to subvert these commands. If our ā€œageā€ value, for instance, is not 34, but, say

34); CREATE TABLE PWNED (Phone CHAR(20)); --

then creating the above INSERT command with this special ā€œageā€ could result in the following command:

INSERT INTO CUSTOMERS VALUES ('John Smith', 34); CREATE TABLE PWNED (Phone CHAR(20)); --);

and suddenly, we have ā€œinjectedā€ a new command that will alter the database by adding a PWNED table.

How would one do this with a grammar? Well, for the above, it suffices to have one more alternative to the <age> rule.

Try adding such alternatives to all data fields processed by a system; feed the Fandango-generated inputs to it; and if you then find a PWNED table on your system, you know that you have a vulnerability.

Danger

Donā€™t try this with other peopleā€™s systems.