Some Fuzzing Strategies#
The idea of fuzzing is to have inputs that are out of the ordinary, so we can detect errors in input parsers and beyond. But let us again have a look at the inputs we generated so far:
$ fandango fuzz -f persons.fan -n 10
Xfa Owgsml,83
Vwvad Kzyavk,9
Nvbznm Pmf,7
Pbbhf Xss,74
Nnhlm Fqrji,841
Jgovgm Jhih,3
Yxcx Ux,32
Xjfxjm Cfykjx,6
Youh Rztt,4
Rcczz Juc,059
Despite clearly looking non-natural to humans, the strings we generated so far are unlikely to trigger errors in a program, because programs typically treat all letters equally. So let us bring a bit more weirdness into our inputs.
Danger
Donāt feed such fuzz inputs into other peopleās systems. In most countries, even trying will get you into jail.
Looooooong Inputs#
One way to increase the probability of detecting bugs is to test with long inputs. While processing data, many programs have limited storage for individual data fields, and thus need to cope with inputs that exceed this storage space. If programmers do not care for such long inputs, serious errors may follow. So-called buffer overflows have long been among the most dangerous vulnerabilities, as they can be exploited to gain unauthorized access to systems.
We can easily create long inputs by specifying the number of repetitions in our grammar:
Appending
{N}
to a symbol, whereN
is a number, makes Fandango repeat this symbolN
times.Appending
{N,M}
to a symbol makes Fandango repeat this symbol betweenN
andM
times.Appending
{N,}
to a symbol makes Fandango repeat this symbol at leastN
times.
If, for instance, we want the above names to be 100 characters long, we can set up a new rule for <name>
<name> ::= <ascii_uppercase_letter><ascii_lowercase_letter>{99}
and the lowercase letters will be repeated 99 times.
This is the effect of this rule:
Nsuajooystcdhbtpcmllaqlhctojuadfmbstubzazsrpzniixhdsktxolztyvntcsmypjfkeahgbscfiqkgjjqaeqegxbwfwnkas Plogtauwiiadnecxgztbyhsfzvmpiynwfiwmbqrsiivegpfdhjfnvkfvtpkjyrgkgnjbhcmyhvyyddxbwdqvwnbcecrtoysokcwp,71
Glhuupiadhtdxbyhfdflakebruxdovngivtrmghvgwhjmjjwzbsbqoheoleocgnavbqijvzeifxedbnrecdmxhtxrwyeogtapofq Tslrrplzpwgcvkquqoljewnfwyooqirnxrlgpywcvtmacxlhtjezeguzkmwapbibxyotzswxguddespyspgrlrwrdufradgllwie,6
Smoyvzdoblnpsmbaciffylhcvgqciyhtvttainmrgmdtjocfwoafuplptfdfqtejhquadwpezhcimgywzsgjnddouckqvztklzpq Kjxjutvvrqrhufnoombgkecfkjowmxpyszjljzyeotqzvajyhfxjcgesvrushmtxsggbrkreprzdeyfhgsdoasfldseyfwqrdgub,36
Qoijgxghkyefyhvpyzhhcdflwwspcazwrxdwryeombztutxcvrximwgjhzljezhjcysrhplozmptxpfguelihxaxfybomidhwvjd Cfxmxewxuptvhyvkjiojvosbakbhgwltyxexkgenvhzfgaixlixbllyvzgjxptxffxfeirevthngurjsxquihqhhxvjpkvkidqne,1
Ohdiayqgsnailbbhvktyfuirnkwzlqolqfyfqlvwukyrcrnjtjtrimbzumrwbvwwwacemyxdzmkctjtpcftutrofqlgcqnbwdiyr Hljtmhgxfgvgbgzpydyxgbvdyjhlvfbzyxfoqqxvkytchydqkdghzqymrriothxdbobxxwvhhwaohvziaaapcskdttpiqkcmtwbx,36
Osfbjtkomlgybuzqeqanrnhoknmmioyovztmogjwefozjabmjldsoednckptrkpvxessfkkibcdhngwezbvkwartzvayuiqqzebd Qkbmsignsnipvmfcokrpkkdhmhjuruobpfjypbatermrmdhqfbekfzjehpppgcsxyyadjtfsucphgraklcuapfyqfxfjiqbkmfcl,49
Pyanauvhfqvtkpdtgroucbszodgdncvfntiwfzhtrosgoownlkyekqneqjqujdzzphaevhotncveamomkukgthfuicqrfrwllfuj Walpkzzvnzmsbgwcjnnemyvhsliultcfxqcaqtmiplmmdjjcntrdaszeavrcvrbrnxgpnubrzsksipbcxzlhklotvgrsgscpiwdz,01
Yffjxzhmeksjhhjfwtgfkveuqhondyfgjuddreopsfenlcsyzwwuxyndzvwlrsuyponiguhdaqmrhkkjhgokzlpmihnessokdpjm Mxussgpmmiwdjpyfajiyfaxtiihciqqvgetzhqxhijesuweyeuclnoaezlskdznluplhdfdzzkxxeymzudvmydshdauetjqhcmzi,89
Avmxvuhlhcgcvtgiyjouojoccytfojkdsllvfpmoqtkojfssgukdiejhhjsedacyujrsplatpjkrfpxevsjxmfxpfkdbpxbxpgec Tuvlfffqyqduaxyojffhoqvzrghowphuhvaqrsmrjhuqywqkjuafcgfseyikjtdadqnroozossmwekckwcrklavwjxubamrktmjw,53
Irhietzclniuhimittyptjzopnljjjkevhjymograrvpebwbswdiwnpdcmkitajgihynragilknbjnsjfoscwgkywhtxwwdnxflb Ukehjpvmqziduelhvtjjrwbqwybxpdptgpwxxvnxcpgxmvrjiqgacwzgqjonrgxienchdmnbirybeeghhszmfvbhajycrksrcvgf,00
We see that the names are now much longer. For real-world fuzzing, we may try even longer fields (say, 1,000) to test the limits of our system.
Note
Programmers often make āoff-by-oneā errors, so if an input is specified to have at most N
characters, you should test this exact boundary - say, by giving N
and N
+1 characters.
Danger
Donāt try this with other peopleās systems.
Unusual Inputs#
Having āweirdā inputs also applies to numerical values. Think about our āageā field, for instance. What happens if we have a person with a negative age?
Try it yourself and modify persons.fan
such that it can also produce negative numbers, as in
Vhxkhu Edybi,-66
Jyr Djqy,-378
Fkcl Dyof,4
Psarh Whoq,2799
Lhe Bl,86
Knprd Sdry,-565
Gpko Lqttu,4147
Ph Dmr,7
Qtfuzj Td,-1875
Iknjvj Pbl,6509
Did you succeed? Compare your answer against the solution below.
Solution
You can, for instance, change the <age>
rule such that it introduces an alternative for negative numbers:
<age> ::= <digit>+ | "-" <digit>+
Another way to do it is to use the ?
modifier, which indicates an optional symbol:
<age> ::= "-"? <digit>+
Other kinds of unusual inputs would be character sets that are out of the ordinary - for instance, Chinese or Hebrew characters - or plain Latin characters if your system expects Chinese names. A simple Emoji, for instance, could be enough to cause the system to fail.
For numbers, besides being out of range, there are a few constants that are interesting.
Some common number parsers and converters accept values such as Inf
(infinity) or NaN
(not a number) as floating-point values. These actually are valid and have special rules ā anything multiplied with Inf
also becomes infinitely large (Inf
times zero is zero, though); and any operation involving a NaN
becomes NaN
.
Imagine what happens if we manage to place a NaN
value in a database?
Any computation involving this value would also become a NaN
, so in our example, the average age of persons would become NaN
.
The NaN
could even go viral across Excel sheets, companies, shareholder reports, and eventually the stock market.
Luckily, programs are prepared against that - or are they?
Danger
Donāt try this with other peopleās systems.
String Injections#
Another kind of attack is to insert special strings into the input āĀ strings that would be interpreted by the program not as data, but as commands. A typical example for this is a SQL injection. Many programs use the SQL, the structured query language, as a means to interact with databases. A command such as
INSERT INTO CUSTOMERS VALUES ('John Smith', 34);
would be used to save the values John Smith
(name) and 34
(age) in the CUSTOMERS
table.
A SQL injection uses specially formed strings and values to subvert these commands.
If our āageā value, for instance, is not 34
, but, say
34); CREATE TABLE PWNED (Phone CHAR(20)); --
then creating the above INSERT
command with this special āageā could result in the following command:
INSERT INTO CUSTOMERS VALUES ('John Smith', 34); CREATE TABLE PWNED (Phone CHAR(20)); --);
and suddenly, we have āinjectedā a new command that will alter the database by adding a PWNED
table.
How would one do this with a grammar?
Well, for the above, it suffices to have one more alternative to the <age>
rule.
Solution
Hereās how one could change the <age>
rule:
<age> ::= <digit>+ | "-" <digit>+
| <digit>+ "); CREATE TABLE PWNED (Phone CHAR(20)); --"
Try adding such alternatives to all data fields processed by a system; feed the Fandango-generated inputs to it; and if you then find a PWNED
table on your system, you know that you have a vulnerability.
Danger
Donāt try this with other peopleās systems.