The goal of this tutorial is to present the usage of each main component of Netzob (inference of message format, construction of the state machine and generation of traffic) through an undocumented protocol.
This tutorial shows how to take advantage of the Peach exporter plugin provided in Netzob to automatically generate Peach pit configuration files, thus allowing to do smart fuzzing on undocumented protocols.
This talk occurred during the 29C3 Conference in Hambourg, Germany.
This talk occurred during the BlackHat Conference 2012 in Abu Dhabi, EAU.
This talk occurred during the International Common Criteria Conference 2012 in Paris, France.
This presentation occurred on June the 6th 2012 and introduced Netzob to the French Security Community.
A lighting talk which occurred in December 2011 in Berlin, Germany.
A first presentation executed in front of SUPELEC in november 2011 to present the first "alpha-release" of Netzob. A good starting point to catch up with the ideas behing Netzob.
In this paper, we present Netzob, an opensource tool which supports the expert in its operations of reverse engineering, evaluation and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocols implementation, simulate realistic communications to test third-party products (IDS, firewalls, etc.) or even create an open source implementation of a proprietary or unknown protocol.
Netzob supports the expert in a semi-automatic manner. It includes the necessaries to passively learn the vocabulary of a protocol and to actively infer its grammar. In addition, it integrates a stochastic and statefull model to represent any statefull communication protocol. The definition of the model can be shared and loaded in a dedicated component of Netzob, its simulator. Therefore, it becomes easy to simulate multiple actors (servers and clients) which communicate according to the inferred protocol, and to apply advanced fuzzing.
Introduce an extended version of a Mealy automata to model and simulate botnets communications.