YoVDO

Fuzzing File System Implementations to Uncover Security Bugs

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Metadata Courses Fuzzing Courses Attack Surface Analysis Courses Vulnerability Research Courses

Course Description

Overview

Explore advanced techniques for fuzzing file system implementations to uncover security vulnerabilities in this comprehensive conference talk from the Hack In The Box Security Conference. Delve into the growing field of vulnerability research and fuzz-testing, focusing on file systems as an often overlooked component in both offensive and defensive security. Learn how to develop general guidelines for efficiently approaching this area of research by identifying potential attack surfaces. Gain insights into automating fuzzing processes for kernel file system implementations, with a particular emphasis on BSD-based systems. Discover the speaker's methodology for evaluating the robustness of established and newer file systems, including the use of mutation, metadata analysis, and user emulation. Examine specific case studies involving ZFS, and understand the importance of monitoring, verification, and core feature testing in the fuzzing process. Conclude with a discussion of key findings, their impact on boot times and network domains, and a live demonstration of the techniques presented.

Syllabus

Introduction
Outline
Why Fuzzing
Why BSD
File System Structure
Why Not Use LAX
First Test Case
Mutation
Metadata
Observations
User Emulation
User Emulation Commands
ZFS
Monitoring
Verification
Core Features
Results
Findings
Boot Times
Netdom
Lip OS
Conclusions
Demo


Taught by

Hack In The Box Security Conference

Related Courses

Assets, Threats, and Vulnerabilities
Google via Coursera
Attack Surface and Security Implications of eSIM Technology
BruCON Security Conference via YouTube
Simplifying Threat Modeling
LASCON via YouTube
Building an AppSec Program from the Ground Up - An Honest Retrospective
LASCON via YouTube
Analyzing & Breaking QNX Exploit Mitigations and PRNGs for Embedded Systems
Black Hat via YouTube