Cyber security

Furlzz – Advanced iOS URL Scheme Fuzzing Made Easy

Furlzz is a small fuzzer written to test out iOS URL schemes. It does so by attaching to the application using Frida and based on the input/seed it mutates the data and tries to open the mutated URL.

Furlzz works in-process, meaning you aren’t actually opening the URL using apps such as SpringBoard. furlzz supports universal links which are being used with scene:continueUserActivity.

Installation

Download prebuilt binaries from here or do it manually.

To manually install furlzz, do:

  • Follow the instructions for devkit documented here
  • Run go install github.com/nsecho/furlzz@latest

Usage

$ furlzz fuzz --help
Fuzz URL scheme

Usage:
  furlzz fuzz [flags]

Flags:
  -a, --app string        Application name to attach to (default "Gadget")
  -b, --base string       base URL to fuzz
  -c, --crash             ignore previous crashes
  -d, --delegate string   if the method is scene_activity, you need to specify UISceneDelegate class
  -f, --function string   apply the function to mutated input (url, base64)
  -h, --help              help for fuzz
  -i, --input string      path to input directory
  -m, --method string     method of opening url (delegate, app) (default "delegate")
  -r, --runs uint         number of runs
  -s, --scene string      scene class name
  -t, --timeout uint      sleep X seconds between each case (default 1)
  -u, --uiapp string      UIApplication name

There are basically two ways you can go with fuzzing using furlzz:

  • give base URL (--base) with FUZZ keyword in it along with --input directory containing inputs
  • just give base URL without FUZZ keyword which would fuzz the raw base url passed (less efficient)

furlzz supports two post-process methods right now; url and base64. The first one does URL encode on the mutated input while the second one generates base64 from it.

Fuzzing

  1. Figure out the method of opening URLs inside the application (with frida-trace for example)
  2. Find out base url
  3. Create some inputs
  4. Pass the flags to furlzz fuzz
  5. Most of the time, values have to be URL encoded, so use --function url
  6. Adjust timeout if you would like to go with slower fuzzing
  7. If the crash happen, replay it with furlzz crash passing created session and crash files

Mutations

  • insert – inserts random byte at random location inside the input
  • del – deletes random byte
  • substitute – substitute byte at random position with random byte
  • byteOp – takes random byte and random position inside the string and do arithmetic operation on them (+, -, *, /)
  • duplicateRange – duplicates random range inside the original string random number of times
  • bitFlip – flips the bit at random position inside random location inside input
  • bitmask – applies random bitmask on random location inside the string
  • duplicate – duplicates original string random number of times (2 < 10)
  • multiple – run other mutations random number of times

URL Open Methods

Right now furlzz supports two methods of opening URLs:

  • delegate when the application uses -[AppDelegate application:openURL:options:]
  • app when the application is using -[UIApplication openURL:]
  • scene_activity – when the application is using -[UISceneDelegate scene:continueUserActivity]
  • scene_context when the application is using -[UISceneDelegate scene:openURLContexts:]

Additional Flags

  • For the method of scene_activity you need to pass the UISceneDelegate class name
  • For the method of delegate you need to pass the AppDelegate class name
  • For the method of scene_context you need to pass UISceneDelegate class name

PRs are more than welcome to extend any functionality inside the furlzz

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

4 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

4 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

4 weeks ago