Skip to content

AonCyberLabs/Fizzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

Fizzer - Fix Fuzzing Framework

Authors:

Brian Holyfield - Gotham Digital Science Michael Hanchak - Gotham Digital Science

www.gdssecurity.com labs@gdssecurity.com

=========================================== Usage:

Fizzer.exe <host> <port> <sender-comp-id> <input file> <sequence start> [csv log file]

Input file should be a TCPDump or Wireshark capture of a legitimate fix conversation in raw format. Messages will be extracted and used as the base for fuzzing. The last login request sent to the Fix Receiver will also be extracted. Messages where the SenderCompId does not match the value from the command line, Logon, and Heartbeat messages will all be ignored. In addition, the following fields are not fuzzed by default in this release: BeginString(8), BodyLength(9), MsgType(35), MsgSeqNum(34), and CheckSum(10)

=========================================== License:

Fizzer is released under the Apache License, version 2.0 (Apache-2.0) https://opensource.org/licenses/Apache-2.0

===========================================

About

Fizzer is an assessment tool for fuzzing FIX messages.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages