Summary
In this chapter, we explored how to fuzz granularly into specific functions/files, and we also showed how difficult it is to demonstrate that a crash leads to a vulnerability and, finally, how to exploit it.
In the next chapter, we will learn how to modify QEMU to add another architecture as if we would like to fuzz it and we don’t have any support for the firmware that the architecture is running. This will be propaedeutic for the upcoming chapters, such as the one about baseband exploitation. We will see in the upcoming chapters how these pieces glue together to build powerful, custom harnesses.