 So, hi everybody. I'm going to talk about an open source project called NetZob. Just speak a little louder and more into the microphone. You can actually bring it towards you. So NetZob is a framework dedicated to help you in the process of reverse engineering of communication protocols. Next slide please. So by communication protocols, I mean every interaction. A little bit too close. I mean every interaction you can find between entities, whether these entities is a binary, a library, a process, a kernel module, a device or even a remote entity. Next slide. So there are different needs to do reverse engineering. So as I come from a security company, my main reason to do that is to assess the robustness of proprietary implementation of protocols. But you may also want to simulate traffic in order to test third party products like IDS or firewalls. You may want to analyze traffic for potential information leakage and you also may want to develop an open source version of a protocol implementation. Slide please. So this is a big picture of NetZob. It's in five parts. The first part is to do data acquisition. So there are captors and sensors to retrieve data from network or API calls, for example. The heart of NetZob is based on grammar and vocabulary in France. And as output, you have the simulation module. You can generate traffic, both client and server. You have the fuzzing part. So you use the simulation part and to do variation on data. And you can export protocol in third to the sector of Wireshark or SCAPI, for example. Slide please. So one word on the vocabulary inference. So the goal is to retrieve the message format of protocol, of each message. And it's based on two main two well-known algorithms in the DNA field. So we have implemented those protocols. The other steps is that NetZob provides is a field type identification, the semantic identification. And one thing which is pretty cool is that NetZob is able to retrieve the file length field and it's associated payload. So you can, for example, retrieve the TCP payload above the IP payload, for example. Slide please. One word on the grammar inference. So the goal is to retrieve the state machine of the protocol. It's based on two well-known algorithms, although it's an active process. So you use an implementation of the protocol that you can stimulate. And you can retrieve the state and transition between states. Slide please. So this is a screenshot of the interface of NetZob. Slide please. So it's licensed under the GPLV3 license. It's developed, notably, as part of a CESIS. And it's sponsored by Amosys and Superlake, which are French company and engineer school. So this is our website, netzob.org. And we will release Debian packages in the next days. So I hope you will enjoy it. Thanks.