I am trying to use afl-fuzz
to find security vulnerabilities in Android native libraries (ex. libssl.so
, libhttp.so
, etc).
It's my understanding that I am supposed to use QEMU since afl
by itself is not sufficient to find bugs without the source code.
When attempting to run the following:
#> afl-fuzz -Q -i input -o output -- ./libssl.so
I run into the following issue:
[-] The current memory limit (200 MB) is too restrictive, causing an OOM fault
in the dynamic linker.
Which I managed to solve by setting the memory restrictions to "none". Then, I ran into this error:
[-] Hmm, looks like the target binary terminated before we could complete
a handshake with the injected code. Perhaps there is a horrible bug in
the fuzzer.
I just started to use afl
recently so I am not quite familiar with how to use it especially with binary libraries. Any help with this will be greatly appreciated!