check-input.sh 1.1 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758
  1. #!/usr/bin/env bash
  2. #
  3. # usage: check-input.sh input_data
  4. #
  5. set -e # stop on error
  6. set -u # uinitialized variables -> error!
  7. #make
  8. C_RED='\033[0;31m' # RED
  9. C_GRN='\033[0;32m' # RED
  10. C_NOC='\033[0m' # No Color
  11. echo "Fuzzer Input: $1"
  12. echo "########## Beginning Fuzzer Chain"
  13. echo ""
  14. set +e
  15. ./fuzzer_listen_verbose -timeout=10 $1 > $1.log 2>&1
  16. #./fuzzer_connect_multi_verbose -timeout=10 $1 > $1.log 2>&1
  17. FUZZER_RETVAL=$?
  18. set -e
  19. echo "Fuzzer returncode: $FUZZER_RETVAL"
  20. if [ "$FUZZER_RETVAL" -eq "0" ]; then
  21. echo -e "$C_RED"
  22. echo "$1 - NOT REPRODUCABLE"
  23. echo -e "$C_NOC"
  24. exit $FUZZER_RETVAL
  25. elif [ "$FUZZER_RETVAL" -eq "77" ]; then
  26. echo -e "$C_GRN"
  27. echo "$1 - REPRODUCABLE"
  28. echo -e "$C_NOC"
  29. else
  30. echo "Unexpected return code: $FUZZER_RETVAL - handle with care..!"
  31. #exit
  32. fi
  33. grep "# SCTP_PACKET" $1.log > $1.pcap-log
  34. text2pcap -n -l 248 -D -t "%H:%M:%S." $1.pcap-log $1.pcapng
  35. rm $1.pcap-log
  36. echo ""
  37. echo "LOG: $1.log"
  38. echo "PCAP: $1.pcapng"
  39. echo ""
  40. # Open Wireshark if we have an X session
  41. #if [ -z ${DISPLAY+x} ]; then
  42. #echo "\$DISPLAY unset, skipping wireshark"
  43. #else
  44. #wireshark $1.pcapng
  45. #fi
  46. exit $FUZZER_RETVAL