Certified Binary Fuzzing & Reversing Professional

Certified Binary Fuzzing & Reversing Professional
(CBFRPro)

The Certified Binary Fuzzing & Reversing Professional exam is an intermediate-level exam designed to test a candidate’s understanding of fuzzing and reversing techniques. Candidates must be able to demonstrate practical knowledge of fuzzing and reversing to pass this exam.

Note: The exam details will be sent to you on/before 1st July 2025.

  • Practical
  • 4 Hours
  • Online
  • On-demand
  • Real world pentesting scenarios

£250

Who should take this exam?

CBFRPro is intended to be taken by pentesters, application security architects, SOC analysts, red and blue team members and any security enthusiasts, who want to evaluate and advance their knowledge.

What is the format of the exam?

CBFRPro is an intense 4 hour long practical exam. It requires candidates to solve a number of challenges, identify and exploit various vulnerabilities and obtain flags. The exam can be taken online, anytime (on-demand) and from anywhere. Candidates will need to connect to the exam VPN server to access the vulnerable applications.

What is the pass criteria for the exam?

The pass criteria are as follows:

  • Candidates scoring over 60% marks will be deemed to have successfully passed the exam.
  • Candidates scoring over 75% marks will be deemed to have passed with merit.

What is the experience needed to take the exam?

This is an intermediate-level exam. Candidates should have prior knowledge and experience in fuzzing and reverse engineering techniques. They should be familiar with common vulnerability types identified through fuzzing, such as buffer overflows, input validation issues, and memory corruption vulnerabilities. Additionally, candidates must understand reverse engineering concepts, including binary analysis, disassembly, and debugging, to analyze and manipulate compiled programs. The exam will test their ability to demonstrate practical knowledge by completing a series of tasks focused on identifying and exploiting vulnerabilities using fuzzing and reverse engineering techniques in a real-world environment.

Note: As this is an intermediate-level exam, a minimum of two years of professional pentesting/bug-bounty experience is recommended.

What will the candidates get?

On completing the exam, each candidate will receive:

  • A certificate with their pass/fail and merit status.
  • The certificate will contain a certificate number, which can be used by anyone to validate the certificate.

What is the exam retake policy?

Candidates who fail the exam are allowed 1 free exam retake within the exam fees.

What are the benefits of this exam?

The certificate will allow candidates to demonstrate their understanding of fuzzing and reverse engineering techniques. This will help them to advance in their career.

How long is the certificate valid for?

The certificate does not have an expiration date. However, the passing certificate will mention the details of the exam such as the exam version and the date. As the exam is updated over time, candidates should retake the newer version exam as per their convenience.

Will you provide any training that can be taken before the exam?

Being an independent certifying authority, we (The SecOps Group) do not provide any training for the exam. Candidates should carefully go over each topic listed in the syllabus and make sure they have adequate understanding, required experience and practical knowledge of these topics. Further, the following independent resources can be utilised to prepare for the exams.

Learning Resources

Exam Syllabus

Understanding Of Different Fuzzing Concepts And Techniques

Types of Fuzzing

  • Application Fuzzing
  • Protocol Fuzzing
  • File Format Fuzzing

Working With Different Fuzzing Tools And Frameworks

  • AFL
  • BooFuzz

Fuzzing Different Software Components

  • APIs, Web Applications And Its Services
  • Network Protocols
  • Binary

Automating Fuzzing Using Scripts/Tools

Overflows

  • Use-After-Free
  • Double Free
  • Null Pointer Dereference
  • Memory Leaks
  • Heap Corruption

Network Protocols

  • TCP/IP Stack Fuzzing
  • Custom Protocol Fuzzing

Race Conditions

Heap Spray

Stack Smashing

Memory Corruption and Crashes

Analyzing Crash Dumps and Logs

Denial of Service (DoS) Related Vulnerabilities

Fuzzing Web Servers

Other Fuzzing Specific Vulnerabilities

Mitigation Strategies For Vulnerabilities Uncovered By Fuzzing

Introduction to Reverse Engineering

  • Types of Reverse Engineering (Static vs Dynamic Analysis)
  • Understanding Executable Formats (PE, ELF, Mach-O)
  • Basics of Assembly Language (x86/x64, ARM)
  • Calling Conventions and ABI (Application Binary Interface)
  • Control Flow Graphs and Program Flow

Disassemblers and Debuggers

  • IDA Pro / Hex-Rays
  • Ghidra
  • Radare2 / Cutter
  • Binary Ninja
  • OllyDbg / x64dbg
  • Hex Editors and Binary Analysis Tools
  • Virtual Machines and Sandboxing for Safe Analysis

Static Analysis

  • Code Disassembly & Decompilation
  • Signature and Pattern Matching
  • Identifying Functions, Strings, and Imports
  • Analyzing Control Flow and Data Flow
  • Understanding and Bypassing Obfuscation

Dynamic Analysis

  • Debugging Techniques
  • Breakpoints, Watchpoints, and Memory Inspection
  • Tracing Execution Flow
  • Hooking and API Monitoring
  • Modifying Execution at Runtime