Fuzzing as a methodology has been an area of interest for generations of security researchers…
Fuzzing as a methodology has been an area of interest for generations of security researchers and has proved to be a very effective way to find vulnerabilities. Today, it is broadly used in various initiatives like OSS-Fuzz or Syzbot, helping open-source projects to detect bugs early on.
This training aims at providing trainees the concepts, methods and tools to deal with any real-life software. Through the use of LIEF, QBDI and Triton, we will explain how it is possible to achieve fast, smart and efficient fuzzing on closed-source targets.
Reverse engineers, software auditors/testers or any security researcher willing to understand the core concepts of binary fuzzing and applying them on any software.
4 days
Introduction to Software Testing and Vulnerability Research
Fuzzing Concepts & Methodology
Feedback-Driven Fuzzing
Getting Further
Binary Instrumentation
Dynamic Instrumentation with QBDI
Honggfuzz + QBDI
Optimization: Be Faster
Optimization: Be Smarter
Introduction to Symbolic Execution
Concrete Emulation with a DSE
SMT Solving & Symbolic Exploration
Symbolic Queries
Ensemble Fuzzing