diff --git a/docs/source/tutorials/windows/windows_driver.md b/docs/source/tutorials/windows/windows_driver.md index c11cdc99..715f0452 100644 --- a/docs/source/tutorials/windows/windows_driver.md +++ b/docs/source/tutorials/windows/windows_driver.md @@ -92,8 +92,6 @@ DeviceIoControl(kafl_vuln_handle, kAFL_hypercall(HYPERCALL_KAFL_RELEASE, 0); ~~~ -The goal will be to trigger these 2 paths with kAFL, get the associated payload and replay those as needed. - ## Provision the guest VM diff --git a/docs/source/tutorials/windows/windows_userspace.md b/docs/source/tutorials/windows/windows_userspace.md index 41244296..1dc6c2ee 100644 --- a/docs/source/tutorials/windows/windows_userspace.md +++ b/docs/source/tutorials/windows/windows_userspace.md @@ -37,8 +37,6 @@ void fuzzme(uint8_t* input, int size){ The `panic()` function is simply a wrapper over a call to `HYPERCALL_KAFL_PANIC`. ::: -The goal will be to trigger these 2 paths with kAFL, get the associated payload and replay those as needed. - ## Provision the guest VM To compile and setup the `selffuzz.exe` target binary into the VM, we provide a Makefile and an Ansible playbook that will upload the resulting binary into the guest,