Practical Network Fuzzing

Uncover Networking Protocol Vulnerabilities with Expert Fuzzing Techniques!

This 3-day hands-on training equips you with the skills to uncover vulnerabilities in networking protocols using cutting-edge fuzzing techniques. From foundational tools like Scapy and Radamsa to advanced approaches with AFL and boofuzz, you’ll explore both mutation-based and stateful fuzzing. Learn to analyze real-world protocols, master coverage-guided fuzzing, and tackle complex challenges to enhance your expertise in protocol security.

⏳ 24 hours | 🧑‍🎓 100+ students | 🔄 Last updated: 15/01/2025

What you will learn

Foundational Fuzzing Concepts and Techniques

Gain a solid foundation in fuzzing with tools like Scapy and Radamsa. Learn mutation-based fuzzing, packet replay, and traffic mutation techniques to uncover vulnerabilities in protocols like HTTP, ICMP, and DNS.

Grammar-Based and Stateful Fuzzing

Delve into structured and stateful fuzzing using tools like boofuzz. Understand how to fuzz complex, multi-step protocols like MQTT, Modbus, and FTP while uncovering vulnerabilities in their state transitions and grammar.

Advanced Coverage-Guided Fuzzing Techniques

Master the use of tools like AFL, AFLnet, and StateAFL to achieve maximum test efficiency on stateful and black-box protocols. Learn to apply coverage-guided fuzzing principles to uncover advanced vulnerabilities in HTTP parsers, DNS resolvers, and custom protocols.

What’s included ?

👨‍🏫 Expert instructor-led sessions with live explanations
👨‍💻 25+ hands-on exercises & labs
♾️ Lifetime access to the ressources
📖 280+ digital and printable slides
📝 Assignments to apply your new skills
💯 Certificate of completion

Perfect for…

This course is for anyone who’s looking for a hands-on and pragmatic approach to audit and secure Rust code such as:

✔ Security engineers
✔ Vulnerability researchers
✔ Pentesters & Red team professionals

Pricing

Individual/
Self-Paced

$3 400
  • E-Learning
BEST VALUE

Teams
On Demand

Starting at
$3 200
per participant
  • E-Learning

Private Training

Starting at
$20 000
  • Instructor led
  • In Person or Live Online

Your instructors

patrick ventuzelo webassembly security rust fuzzing

Patrick
Ventuzelo

Patrick, CEO & Founder of FuzzingLabs, has 7 years of experience training on Rust and Go, applied to fuzzing and reverse engineering.

Matthieu Christophe

Matthieu is a security engineer with experience in the energy, banking, and automotive sectors. He specializes in hardware and network security.

Content

Day 1: Introduction to Fuzzing

Learn the basics of fuzzing, including mutation-based fuzzing, packet replay, and traffic mutation workflows.

Topics Covered

  • What is fuzzing?
  • Types of fuzzing: Dumb, mutation-based, and replay-based fuzzing.
  • Tools: Scapy, Radamsa, pcap replay.

Exercises

  • Replay and mutate HTTP packets.
  • Perform ICMP packet fuzzing.
  • Mutate DNS queries to detect protocol parsing errors.

Advanced Exercise

  • Automate traffic mutation for any protocol using Scapy.

Day 2: Grammar-Based and Stateful Fuzzing

Explore grammar-based and stateful fuzzing for structured, multi-step protocols like MQTT, Modbus, and FTP.

Topics Covered

  • Introduction to grammar-based fuzzing.
  • Stateless vs. stateful fuzzing.
  • Tools: boofuzz.

Exercises

  • Grammar-based fuzzing of MQTT (e.g., CONNECT and PUBLISH commands).
  • Grammar-based fuzzing of Modbus protocol packets.
  • Stateful fuzzing of FTP commands (USER, PASS, LIST).

Advanced Exercise

  • Develop a custom grammar for SIP protocol fuzzing (e.g., INVITE, REGISTER) and test it against an open-source SIP server.

Day 3: Coverage-Guided Fuzzing

Master coverage-guided fuzzing techniques to uncover vulnerabilities in stateful and black-box protocols.

Topics Covered

  • Coverage-guided fuzzing principles.
  • Tools: AFL, AFLnet, StateAFL, Honggfuzz.
  • Applying coverage-guided fuzzing to stateful and black-box protocols.

Exercises

  • Fuzz an HTTP parser to achieve maximum code coverage.
  • Apply coverage-guided fuzzing to a DNS resolver.
  • Perform stateful fuzzing of a custom TCP-based protocol using AFLnet.
  • Fuzz complex state machine-based services with StateAFL.

Advanced Exercise

  • Reverse engineer a proprietary protocol, create an AFL harness, and fuzz it using Honggfuzz or AFLnet.

Prerequisite

  • Familiarity with scripting (Python, Bash) and Linux.
  • Familiarity with C/C++ and JavaScript.
  • A working laptop capable of running virtual machines
  • 8GB RAM required, at a minimum
  • 80 GB free Hard disk space
  • VirtualBox
  • Administrator/root access MANDATORY

Any questions about our services and trainings ?

Get in touch today with any questions that you might have.

Keep in touch with us !

email

contact@fuzzinglabs.com

X (Twitter)

@FuzzingLabs

Github

FuzzingLabs

LinkedIn

FuzzingLabs

email

contact@fuzzinglabs.com

X (Twitter)

@FuzzingLabs

Github

FuzzingLabs

LinkedIn

FuzzingLabs