技能 硬件工程 系统漏洞识别与分析方法

系统漏洞识别与分析方法

v20260415
offensive-bug-identification
本技能提供了一套系统化的软件漏洞发现流程。内容涵盖静态分析、动态分析、模糊测试、污点分析等前沿技术,并详细介绍了从代码审核到操作系统内核和驱动层面的攻击面识别。适用于专业的代码审计、漏洞挖掘和安全渗透测试。
获取技能
382 次下载
概览

SKILL: Bug Identification

Metadata

Description

Systematic bug identification methodology: source code review patterns, black-box testing strategies, taint analysis, dangerous function hunting, data flow tracing, and automated scanning setup. Use for code audits, bug bounty triage, or building vulnerability identification pipelines.

Trigger Phrases

Use this skill when the conversation involves any of: bug identification, code review, taint analysis, dangerous functions, data flow, source audit, black box, vulnerability identification, static analysis, code audit, bug hunting

Instructions for Claude

When this skill is active:

  1. Load and apply the full methodology below as your operational checklist
  2. Follow steps in order unless the user specifies otherwise
  3. For each technique, consider applicability to the current target/context
  4. Track which checklist items have been completed
  5. Suggest next steps based on findings

----------------- | ----------------- | ------------------- | | Linux Kernel | Syzkaller, AFL++ | KASAN, KCOV, ftrace | | Windows Kernel | ICICLE, WinAFL | Verifier, KFUZZ | | Browsers | LibFuzzer, Domato | ClusterFuzz, Dharma | | Network Services | AFL++, Boofuzz | Peach, Sulley | | Mobile Apps | QARK, Frida | MobSF, Objection | | Web Apps | Burp Suite, FFUF | Nuclei, Semgrep | | Firmware | Binwalk, EMBA | FACT, Firmwalker | | Containers | Trivy, Falco | Grype, Syft |

By Technique

Technique Recommended Tools Notes
Coverage Fuzzing AFL++ 4.21+ Cross-platform, CMPLOG support
Snapshot Fuzzing Nyx, QEMU+AFL++ Stateful target support
Concurrency Fuzzing RFF, ThreadSanitizer Race condition detection
Symbolic Execution Angr, Triton Path exploration
Taint Analysis DynamoRIO, Triton Data flow tracking
Binary Diffing BinDiff 8, Ghidriff Patch analysis
Static Analysis CodeQL, Semgrep Pattern matching
Dynamic Analysis Frida, DynamoRIO Runtime instrumentation

Tool Migration Path

Old Tool New Alternative Migration Notes
Intel Pin DynamoRIO Pin is sustain-only
WinAFL AFL++ 4.x Integrated Windows support
Radamsa LibAFL mutators Better coverage awareness
BinDiff 7 BinDiff 8/Ghidriff Improved algorithms
IDA 7.x IDA 8.x/Ghidra 11 Better decompilation
信息
Category 硬件工程
Name offensive-bug-identification
版本 v20260415
大小 54.59KB
更新时间 2026-04-28
语言