RSS feed logo header graphic

Black Hat USA 2009 Weekend Training Session

July 25-26

Black Hat USA 2009 Weekday Training Session

July 27-28

Effective Fuzzing: Using the Peach Fuzzing Platform

Michael Eddington, Leviathan
Blake Frantz, Leviathan

Register Button


The entirety of the course is student centric, hands on, and lab intensive. On day one, students will be instructed on the use of the Peach Fuzzing Platform, from a practitioner's perspective, learning the ways in which Peach can be used to fuzz a variety of targets including network protocol parsers, ActiveX/COM interfaces, file parsers, APIs, and web services. Students will also be introduced to new methods by which fuzzing can be utilized to locate security flaws not typically considered detectable by fuzzing, including N-tier applications.

On the second day, students will be exposed to the internals of Peach for a developer's perspective. The Peach architecture and module interfaces will be explained in great detail as to equip students with the skills necessary to extend and adapt Peach to their custom needs. Students will then develop their own Peach extensions in a lab environment to reinforce these concepts.

Upon completion of this course, students will be enabled to create effective fuzzers that target:

  • State-aware network protocol parsers
  • N-tier applications
  • Arbitrary APIs
  • File parsers
  • COM and Active/X components
  • Detect non-classic faults in software
  • Extend the Peach Fuzzing Platform by creating custom Transformers, Generators, Publishers, and Monitors.
  • Apply these concepts and tools to their unique environment
  • Utilize parallel fuzzing to increase fuzzing efficiency


Michael Eddington is a Principal Security Consultant with Leviathan. Mike has over ten years experience in computer security, with expertise in application security, network security, and threat modeling. Mike's recent security testing and analysis work includes design review, penetration testing, and code review of pre-release operating system features and protocols; penetration testing and code review of a prominent ecommerce purchasing application; and penetration testing of a cross-browser, cross-platform plug-in for delivering next-generation media experiences and rich interactive applications for the Web. Prior to joining Leviathan Security Group, Michael started, ran, and grew the security services practice for one of the Pacific Northwest's most well-known security consultancies. Michael also co-founded the Security Services Center for Hewlett-Packard's services division, developing many of their security methodologies in addition to developing and delivering security training courses. Michael is also an accomplished software developer, having participated in a number of open-source security development projects ranging from threat modeling (e.g. the Trike threat modeling conceptual framework) to fuzzing (e.g. The Peach Fuzzing Platform ).

Blake Frantz, CTO at the Center for Internet Security, has over twelve years of professional experience in information security, with a broad background ranging from software security research to enterprise policy development. Currently, Blake leads the Center's benchmark and scoring tool programs. Before joining CIS, Blake was a founding principal of Leviathan Security Group, where he performed security assessments and code reviews of prevalent operating systems, e-voting platforms, and social networking sites. Prior to Leviathan, Blake was a senior security engineer at a Fortune 100 financial services organization, where he was responsible for leading vulnerability assessments of critical financial systems. Blake has authored and edited papers and tools on the topics of reverse engineering, vulnerability discovery, and exploitation for the Uniformed Journal; has conducted international trainings on secure coding practices and fuzzing; and is a contributor to the book “Hacking Exposed: Windows, Third Edition”.

Register Button
Super Early:
Ends Mar 15
Ends May 1

Ends Jul 1

Ends Jul 22







Black Hat Webcasts

Black Hat Social

About Black Hat | Privacy Policy | Sponsorship Inquiry | DEFCON | Black Hat Main RSS Feed