Network Protocol Fuzzing

March 14, 2016 (at 9 a.m.)

This workshop will cover all steps and methods for the analysis and fuzzing of network protocols. This is an exercise heavy course, attendees should be prepared to spend a lot of time inside Wireshark, hex editors, and a Python IDE.


Who should attend?

IT Security professionals that are interested to learn more about network protocol analysis and fuzzing, in particular vulnerability research and penetration testers.


Daniel Mende

Daniel Mende is a German security researcher with ERNW GmbH and specializes in network protocols and technologies. He is well known for his Layer2 extensions of the SPIKE and Sulley fuzzing frameworks. He has also discussed new ways of building botnets and presented on protocol security at many occasions including Troopers, ShmooCon and Black Hat. He has written several tools for assessment of telecommunication networks like Pytacle, GTP-Scan, Dizzy and APNBF.