Revisiting automating MS-RPC vulnerability research and making the tool open source
文章介绍了Windows中的远程过程调用(MS-RPC)协议及其在进程间通信中的作用。由于手动分析大量RPC接口耗时且复杂,作者设计并实现了一种新的模糊测试算法,并发布了相关工具供研究人员使用。 2025-7-14 08:31:59 Author: www.reddit.com(查看原文) 阅读量:12 收藏

r/netsec icon

Go to netsec

r/netsec

/r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to provide value to security practitioners, students, researchers, and hackers everywhere. ‎


Members Online

Microsoft Remote Procedure Call (MS-RPC) is a protocol used within Windows operating systems to enable inter-process communication, both locally and across networks.

Researching MS-RPC interfaces, however, poses several challenges. Manually analyzing RPC services can be time-consuming, especially when faced with hundreds of interfaces spread across different processes, services and accessible through various endpoints.

This post will dive into the new algorithm/method I designed and implemented for fuzzing. It will describe some results and why these results differ from the default fuzzing approach. Apart from the additional implemented features, the tool will be released with this post as well! All security researchers from over the world can now freely use this tool in their research.


文章来源: https://www.reddit.com/r/netsec/comments/1lzh1t5/revisiting_automating_msrpc_vulnerability/
如有侵权请联系:admin#unsafe.sh