Environment setup
Each pod gets one ubuntu-fuzzing VM provisioned by Terraform. The image
is baked with the workshop tooling so you can jump straight into the labs.
Connecting
- SSH: use the per-pod Ed25519 private key from the Terraform output as
the
ciscouser. The pod’s public IPv4 address is also in the output. - Console: from the CML workbench, open the
ubuntu-fuzzingnode’s console. The desktop auto-logs in asciscofor VNC use.
Password auth is disabled in sshd. If you lose the key, you can still
add a new authorized_keys entry from the CML console and re-enable key
auth from there.
Pre-installed tooling
The image ships with (non-exhaustive):
clang/clang++with sanitizers (ASan, UBSan, MSan)afl++andhonggfuzzlibfuzzerheaders/runtimegdb,lldb,rr- Common build tooling:
cmake,ninja,make,pkg-config
Run which afl-fuzz clang++ to confirm.