afl-in-the-cloud
afl-in-the-cloud copied to clipboard
Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure
trafficstars
AFL in the Cloud
Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure
Usage
- Download and install
Terraformfollowing the Installation Guide - Edit
terraform.tfvarsas required - Deploy infrastructure by running the plan
terraform init
terraform validate
terraform apply
To destroy the infrastructure
terraform destroy
What it does?
The Terraform script creates a bunch of resources in AWS. The resources basically are
- EC2 instances for deploying fuzzer containers
- EFS storage as shared storage across all instances
Resources Created
- VPC
- Internet Gateway
- Subnet and Route
- Security Group
- EFS Storage
- EFS Mount Target (NFS)
- IAM Role for attaching to EC2 instances
- IAM Policy for allowing access to ECR
- 1 x EC2 instance for
master - N x EC2 instances for
slaves
Notes
The setup uses multi-machine fuzzing to achieve scale. The sync-dir is on a shared network file system, something which is not recommended by the AFL author due to lock-up issues with NFS. As workaround, we are using -f option to have AFL create the input file in /tmp. Only internal fuzzer state and crashes are shared over NFS.
References
- http://lcamtuf.coredump.cx/afl/
- https://hub.docker.com/r/abh1sek/afl-base/