Main Topics
- Fuzzing Basics
- Network Protocol Fuzzing
- Mutation Based Fuzzing
- File Format Based Fuzzing
- Gap Analysis with Reverse Engineering Methods
Who Can Participate
Vulnerability researchers and software developers
Prerequisites
Basic knowledge of information systems
Experience to be Obtained at the End of Education
Participants in the training are expected to have sufficient knowledge to conduct openness research on applications.
Duration: 3 days