
This hands-on training covers advanced Rust security techniques, including auditing, fuzzing, and crash triaging. Master tools like cargo-fuzz and AFL to secure Rust applications and stay ahead in vulnerability research.



What you will learn
Master Rust Security Fundamentals
Understand Rust's unique security concepts like ownership, borrowing, and lifetimes, and learn to identify and address common vulnerabilities such as unsafe code, data races, and cryptographic issues.Conduct Comprehensive Security Audits
Explore advanced Rust auditing tools and techniques to uncover logic bugs, memory leaks, and attack surfaces, ensuring robust and secure Rust applications.Harness the Power of Fuzz Testing
Dive into coverage-guided fuzzing workflows with tools like cargo-fuzz and afl-rs, and gain expertise in analyzing crashes, minimizing corpora, and writing custom structure-aware Rust fuzzers.What’s included ?








Perfect for…
This course is for anyone who’s looking for a hands-on and pragmatic approach to audit and secure Rust code such as:✔ Security engineers
✔ Vulnerability researchers
✔ Pentesters & Red team professionals
Content
Module 1
- Introduction to Rust and its Ecosystem
- Security concepts
- Ownership, Borrowing and Lifetime
- Rust most common vulnerabilities
- Error handling & Unwrapping, Panicking macros, Arithmetic errors
- Index out of bound, Stack overflow, resource exhaustion (OOM)
- Unsafe codes
- Tooling and Sanitizers (ASAN, MSAN, etc.)
- Out of bound access (OOB), Use-after-free (UAF), Double free, Memory leak, Data Races and Race Conditions
- Rust advanced vulnerabilities
- Logic bugs, FFI, Cryptographic issues, Uninitialized & Zeroing memory
- Attack surface discovery & Auditing tools
- Fuzzing Introduction and Workflow
- Coverage-guided Fuzzing in Rust
- cargo-fuzz, afl-rs, honggfuzz-rs
- Improve your Fuzzing Process
- Code coverage, Corpus selection, Corpus minimization
- Crashes Triaging and Debugging
- Structure-aware & Grammar-based Fuzzing
- Other Advanced Testing techniques
- Symbolic Execution, Formal verification
- Differential Fuzzing
- Writing Custom Rust Fuzzers
Prerequisite
- Familiarity with Linux and Rust.
- A working laptop capable of running virtual machines
- 4GB RAM required, at a minimum
- 40 GB free Hard disk space
- VirtualBox
- Administrator/root access MANDATORY