Overview
The/fuzz command performs coverage-guided fuzzing on binary executables using AFL++. It’s an alias for /raptor-fuzz and automatically analyzes crashes to generate exploits.
Syntax
Parameters
Absolute path to the binary executable to fuzz
Fuzzing duration in seconds (default: 6600 = 110 minutes)
Path to seed corpus directory for initial test cases
Maximum number of crashes to collect before stopping
What It Does
- Configures AFL++ fuzzing environment
- Runs coverage-guided fuzzing on the target binary
- Detects crashes and hangs
- Automatically analyzes crashes with ASAN
- Generates exploit PoCs for discovered vulnerabilities
- Produces crash analysis reports
Examples
Basic Fuzzing (110 minutes)
Quick Fuzz Test (10 minutes)
With Custom Seed Corpus
Prerequisites
Required Tools
- AFL++: Coverage-guided fuzzer
- ASAN: AddressSanitizer for crash detection
- GCC/Clang: Compiler with sanitizer support
Optimal Binary Compilation
macOS Configuration
If fuzzing fails withshmget() failed error:
Output Structure
Vulnerability Types Detected
- Buffer overflows
- Heap corruption
- Use-after-free
- Stack overflow
- Integer overflow
- Format string bugs
- Null pointer dereference
Use Cases
- Binary security auditing
- Crash discovery and analysis
- Exploit development
- Regression testing
- Memory corruption detection
Performance Tips
- Compile with AFL instrumentation for better coverage
- Use ASAN for precise crash detection
- Provide quality seed corpus for faster results
- Run for at least 1 hour for meaningful results
- Use multiple CPU cores with parallel fuzzing
Related Commands
/crash-analysis
Deep root-cause analysis of crashes
/exploit
Generate exploit PoCs from vulnerabilities
/validate
Validate exploitability of findings
Notes
- Fuzzing can take hours to days for thorough coverage
- RAPTOR automatically analyzes crashes and generates exploits
- Binary should ideally be compiled with instrumentation
- For educational and authorized testing only