Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Fuzzing RDP Client and Server

Hack In The Box Security Conference via YouTube

Overview

Explore the intricacies of fuzzing the Remote Desktop Protocol (RDP) in this 47-minute conference talk from the Hack In The Box Security Conference. Dive into the journey of adapting a traditional coverage-guided fuzzer (WinAFL) to test a complex network protocol, focusing on both RDP client and server implementations. Learn about the innovative approach of fuzzing RDP from both ends, a concept not previously explored. Discover how the speakers utilized WinAFL, DynamoRIO, and custom enhancements to target multiple RDP channels and message types, uncovering numerous new bugs. Gain insights into the challenges faced during development, result analysis, and the responsible disclosure process. The talk covers various aspects including the RDP attack surface, coverage-guided fuzzing setup, code patches, grammar enforcement, multi-channel input, and automatic crash analysis. Presented by security researchers Shaked Reiner and Or Ben-Porath from CyberArk, this talk offers valuable knowledge for those interested in vulnerability research, OS security, and advanced fuzzing techniques.

Syllabus

Intro
Agenda
RDP Attack Vector #2
Examples
Attack Surface
Read Surface
Protocol Stack
General Info
Coverage-guided Fuzzing Setup
Fuzzing Options
DR Attach
Background Fuzzing
Statefulness
Code Patches
Grammar Enforcement
Multi-input
Multi-channel Input
Locating Target Functions
Reproduction Issues
Automatic Crash Analysis
AUDIO_PLAYBACK Channel
Crashing Input
Future Work

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Fuzzing RDP Client and Server

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.