WebAssembly Reversing and Dynamic

Dissect, Decompile, and Hack WebAssembly with Advanced Techniques!

This hands-on training dives deep into WebAssembly reverse engineering, teaching you to analyze modules, reconstruct control flow graphs, and detect malicious patterns. Learn to decompile and de-obfuscate WebAssembly bytecode, leverage dynamic binary instrumentation, and even hack WebAssembly-based video games. Gain expertise in advanced analysis techniques to stay ahead in modern WebAssembly security research.

⏳ 16 hours | 🧑‍🎓 200 students | 🔄 Last updated : 17/12/2024

 

What you will learn

Mastering WebAssembly Module Reversing

Learn how WebAssembly modules are structured, compiled, and debugged. Explore WebAssembly binary and text formats, reconstruct control flow graphs (CFG), and analyze data flow to gain a deep understanding of how WebAssembly executes code.

Advanced WebAssembly Analysis and Deobfuscation

Develop skills in analyzing WebAssembly module instructions, detecting cryptominers and malware patterns, and using static and dynamic techniques like Dynamic Binary Instrumentation (DBI) and Static Single Assignment (SSA) decompilation to break down complex code structures.

Exploiting and Hacking WebAssembly Applications

Apply reverse engineering techniques to real-world scenarios, including video game hacking and bypassing WebAssembly security measures. Understand how obfuscation and anti-analysis techniques work and how to defeat them.

What’s included ?

👨‍💻 25+ hands-on exercises & labs
♾️ Lifetime access
📖 280+ digital and printable slides
📝 Assignments to apply your new skills
💯 Certificate of completion

Perfect for…

This course is for anyone who’s looking for a hands-on and pragmatic approach to audit and secure Rust code such as:

✔ Security engineers
✔ Vulnerability researchers
✔ Pentesters & Red team professionals

Pricing

Individual/
Self-Paced

$2 400
  • E-Learning
BEST VALUE

Teams
On Demand

Starting at
$2 200
per participant
  • E-Learning

Private Training

Starting at
$20 000
  • Instructor led
  • In Person or Live Online

Your instructors

patrick ventuzelo webassembly security rust fuzzing

Patrick
Ventuzelo

Patrick, CEO & Founder of FuzzingLabs, has 7 years of experience training on Rust and Go, applied to fuzzing and reverse engineering.

Content

Module 1 – WebAssembly Reverse Engineering
  • Introduction to WebAssembly ecosystem
  • WebAssembly compilation and toolchain
  • Instructions set and Debugging WebAssembly module
  • WebAssembly binary and Text Format
  • WebAssembly Module reversing
  • CFG & Call Graph reconstruction
  • Data Flow Graph analysis
Module 2 – Advanced WebAssembly Modules Analysis
  • Modules Instructions analytics/metrics
  • Cryptominers analysis and Pattern detection signatures
  • Dynamic Binary Instrumentation (DBI)
  • Bytecode (De)-Obfuscation techniques
  • Static Single Assignment (SSA) & Decompilation
  • Hacking WebAssembly video game

Prerequisite

  • Basic reverse engineering skills.
  • Familiarity with scripting (Python, Bash).
  • SKILL LEVEL: BEGINNER / INTERMEDIATE
  • A working laptop capable of running virtual machines
  • 4GB RAM required, at a minimum
  • 40 GB free Hard disk space
  • VirtualBox
  • Administrator / root access MANDATORY
  • IDA Pro would be helpful but not required

This course is suitable for people that are new to WebAssembly. All the theory and concepts about WebAssembly reversing will be explained during the course.

What our Students say

Learned so much about modern WebAssembly security. The lecture and exercise learning format is excellent! It’s very worth it and I highly recommend Patrick’s course!

Zion P.

Security Engineer

Great training, covering a lot of information from beginner level and then building up slowly up to advanced stuff.

Adrian T.

Vulnerability Researcher

A very well designed training with tons to learn. Most importantly the guidance and workflow from Patrick makes this training a must have when entering the Wasm space.

Georgios D.

Software Engineer

Any questions about our services and trainings ?

Get in touch today with any questions that you might have.

Our latest articles about Rust Security

Keep in touch with us !

email

contact@fuzzinglabs.com

X (Twitter)

@FuzzingLabs

Github

FuzzingLabs

LinkedIn

FuzzingLabs

email

contact@fuzzinglabs.com

X (Twitter)

@FuzzingLabs

Github

FuzzingLabs

LinkedIn

FuzzingLabs