sfuzz Usage Example

Fuzz the target server (-S 192.168.1.1) on port 10443 (-p 10443) with TCP output mode (-T), using the basic HTTP config (-f /usr/share/sfuzz/sfuzz-sample/basic.http):

root@kali:~# sfuzz -S 192.168.1.1 -p 10443 -T -f /usr/share/sfuzz/sfuzz-sample/basic.http
[12:53:47] dumping options:
    filename: </usr/share/sfuzz/sfuzz-sample/basic.http>
    state:    <8>
    lineno:   <56>
    literals:  [74]
    sequences: [34]
    symbols: [0]
    req_del:  <200>
    mseq_len: <10024>
    plugin: <none>
    s_syms: <0>
    literal[1] = [AREALLYBADSTRING]

Packages and Binaries:

sfuzz

In the same vein as the Generic Protocol Framework, sfuzz is a really simple to use black box testing suite called Simple Fuzzer (what else would you expect?). The goal is to provide a simple to use, but fairly powerful and flexible black box testing utility.

Installed size: 187 KB
How to install: sudo apt install sfuzz

  • libc6
sfo

sfuzz
root@kali:~# sfuzz -h
		Simple Fuzzer
By:	 Aaron Conole
version: 0.7.0
url:	 http://aconole.brad-x.com/programs/sfuzz.html
EMAIL:	 apconole@yahoo.com
Build-prefix: /usr
	-h	 This message.
	-V	 Version information.

networking / output:
	-v	 Verbose output
	-q	 Silent output mode (generally for CLI fuzzing)
	-X	 prints the output in hex

	-b	 Begin fuzzing at the test specified.
	-e	 End testing on failure.
	-t	 Wait time for reading the socket
	-S	 Remote host
	-p	 Port
	-T|-U|-O TCP|UDP|Output mode
	-R	 Refrain from closing connections (ie: "leak" them)

	-f	 Config File
	-L	 Log file
	-n	 Create a new logfile after each fuzz
	-r	 Trim the tailing newline
	-D	 Define a symbol and value (X=y).
	-l	 Only perform literal fuzzing
	-s	 Only perform sequence fuzzing

Updated on: 2021-Nov-26