Finding and Developing Vulnerabilities

Share on facebook
Share on google
Share on twitter
Share on linkedin

Main Topics

  • Fuzzing Basics
  • Network Protocol Fuzzing
  • Mutation Based Fuzzing
  • File Format Based Fuzzing
  • Gap Analysis with Reverse Engineering Methods

Who Can Participate
Vulnerability researchers and software developers

Prerequisites
Basic knowledge of information systems

Experience to be Obtained at the End of Education
Participants in the training are expected to have sufficient knowledge to conduct openness research on applications.

Duration: 3 days