From 8ab7b6f45004601db234be15287133e3c8cd8706 Mon Sep 17 00:00:00 2001 From: Mathieu Tarral Date: Wed, 19 Jul 2023 14:10:04 +0200 Subject: [PATCH] docs: fix windows tutorial --- docs/source/tutorials/windows/windows_driver.md | 2 -- docs/source/tutorials/windows/windows_userspace.md | 2 -- 2 files changed, 4 deletions(-) diff --git a/docs/source/tutorials/windows/windows_driver.md b/docs/source/tutorials/windows/windows_driver.md index c11cdc99..715f0452 100644 --- a/docs/source/tutorials/windows/windows_driver.md +++ b/docs/source/tutorials/windows/windows_driver.md @@ -92,8 +92,6 @@ DeviceIoControl(kafl_vuln_handle, kAFL_hypercall(HYPERCALL_KAFL_RELEASE, 0); ~~~ -The goal will be to trigger these 2 paths with kAFL, get the associated payload and replay those as needed. - ## Provision the guest VM diff --git a/docs/source/tutorials/windows/windows_userspace.md b/docs/source/tutorials/windows/windows_userspace.md index 41244296..1dc6c2ee 100644 --- a/docs/source/tutorials/windows/windows_userspace.md +++ b/docs/source/tutorials/windows/windows_userspace.md @@ -37,8 +37,6 @@ void fuzzme(uint8_t* input, int size){ The `panic()` function is simply a wrapper over a call to `HYPERCALL_KAFL_PANIC`. ::: -The goal will be to trigger these 2 paths with kAFL, get the associated payload and replay those as needed. - ## Provision the guest VM To compile and setup the `selffuzz.exe` target binary into the VM, we provide a Makefile and an Ansible playbook that will upload the resulting binary into the guest,