Practical Network Fuzzing

Uncover Networking Protocol Vulnerabilities with Expert Fuzzing Techniques!

This 3-day hands-on training equips you with the skills to uncover vulnerabilities in networking protocols using cutting-edge fuzzing techniques. From foundational tools like Scapy and Radamsa to advanced approaches with AFL and boofuzz, you’ll explore both mutation-based and stateful fuzzing. Learn to analyze real-world protocols, master coverage-guided fuzzing, and tackle complex challenges to enhance your expertise in protocol security.

⏳ 24 hours | 🧑‍🎓 100+ students | 🔄 Last updated: 15/01/2025

What you will learn

Foundational Fuzzing Concepts and Techniques

Gain a solid foundation in fuzzing with tools like Scapy and Radamsa. Learn mutation-based fuzzing, packet replay, and traffic mutation techniques to uncover vulnerabilities in protocols like HTTP, ICMP, and DNS.

Grammar-Based and Stateful Fuzzing

Delve into structured and stateful fuzzing using tools like boofuzz. Understand how to fuzz complex, multi-step protocols like MQTT, Modbus, and FTP while uncovering vulnerabilities in their state transitions and grammar.

Advanced Coverage-Guided Fuzzing Techniques

Master the use of tools like AFL, AFLnet, and StateAFL to achieve maximum test efficiency on stateful and black-box protocols. Learn to apply coverage-guided fuzzing principles to uncover advanced vulnerabilities in HTTP parsers, DNS resolvers, and custom protocols.

What’s included ?

👨‍🏫 Expert instructor-led sessions with live explanations
👨‍💻 25+ hands-on exercises & labs
♾️ Lifetime access to the ressources
📖 280+ digital and printable slides
📝 Assignments to apply your new skills
💯 Certificate of completion

Perfect for…

This course is for anyone who’s looking for a hands-on and pragmatic approach to audit and secure Rust code such as:

✔ Security engineers
✔ Vulnerability researchers
✔ Pentesters & Red team professionals

Pricing

Individual/
Self-Paced

$3 400
  • E-Learning
BEST VALUE

Teams
On Demand

Starting at
$3 200
per participant
  • E-Learning

Private Training

Starting at
$20 000
  • Instructor led
  • In Person or Live Online

Your instructors

patrick ventuzelo webassembly security rust fuzzing

Patrick
Ventuzelo

Patrick, CEO & Founder of FuzzingLabs, has 7 years of experience training on Rust and Go, applied to fuzzing and reverse engineering.

Matthieu Christophe

Matthieu is a security engineer with experience in the energy, banking, and automotive sectors. He specializes in hardware and network security.

Trainings at Upcoming Events and Conferences

No upcoming events for this training.

Content

Day 1: Introduction to Fuzzing

Learn the basics of fuzzing, including mutation-based fuzzing, packet replay, and traffic mutation workflows.

Topics Covered

  • What is fuzzing?
  • Types of fuzzing: Dumb, mutation-based, and replay-based fuzzing.
  • Tools: Scapy, Radamsa, pcap replay.

Exercises

  • Replay and mutate HTTP packets.
  • Perform ICMP packet fuzzing.
  • Mutate DNS queries to detect protocol parsing errors.

Advanced Exercise

  • Automate traffic mutation for any protocol using Scapy.

Day 2: Grammar-Based and Stateful Fuzzing

Explore grammar-based and stateful fuzzing for structured, multi-step protocols like MQTT, Modbus, and FTP.

Topics Covered

  • Introduction to grammar-based fuzzing.
  • Stateless vs. stateful fuzzing.
  • Tools: boofuzz.

Exercises

  • Grammar-based fuzzing of MQTT (e.g., CONNECT and PUBLISH commands).
  • Grammar-based fuzzing of Modbus protocol packets.
  • Stateful fuzzing of FTP commands (USER, PASS, LIST).

Advanced Exercise

  • Develop a custom grammar for SIP protocol fuzzing (e.g., INVITE, REGISTER) and test it against an open-source SIP server.

Day 3: Coverage-Guided Fuzzing

Master coverage-guided fuzzing techniques to uncover vulnerabilities in stateful and black-box protocols.

Topics Covered

  • Coverage-guided fuzzing principles.
  • Tools: AFL, AFLnet, StateAFL, Honggfuzz.
  • Applying coverage-guided fuzzing to stateful and black-box protocols.

Exercises

  • Fuzz an HTTP parser to achieve maximum code coverage.
  • Apply coverage-guided fuzzing to a DNS resolver.
  • Perform stateful fuzzing of a custom TCP-based protocol using AFLnet.
  • Fuzz complex state machine-based services with StateAFL.

Advanced Exercise

  • Reverse engineer a proprietary protocol, create an AFL harness, and fuzz it using Honggfuzz or AFLnet.

Prerequisite

  • Familiarity with scripting (Python, Bash) and Linux.
  • Familiarity with C/C++ and JavaScript.
  • A working laptop capable of running virtual machines
  • 8GB RAM required, at a minimum
  • 80 GB free Hard disk space
  • VirtualBox
  • Administrator/root access MANDATORY

Any questions about our services and trainings ?

Get in touch today with any questions that you might have.

Keep in touch with us !

email

contact@fuzzinglabs.com

X (Twitter)

@FuzzingLabs

Github

FuzzingLabs

LinkedIn

FuzzingLabs

email

contact@fuzzinglabs.com

X (Twitter)

@FuzzingLabs

Github

FuzzingLabs

LinkedIn

FuzzingLabs