Software Uses Hacker Tactic To Find Security Vulnerabilities - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

02:20 PM

Software Uses Hacker Tactic To Find Security Vulnerabilities

The idea behind the technique, called "fuzzing," is to take a certain request--between a Web browser and a server, for example--and modify it so that it's slightly different from what one side expects.

Know thy enemy and his methods. A security vendor is putting that philosophy to work by co-opting a common hacker technique to help software developers and testers weed out glitches in applications that could become targets of exploits.

The idea behind the technique, called fuzzing, is to take a certain request--between a Web browser and a server, for example--and modify it so that it's slightly different from what one side expects. Although time-consuming, fuzzing can point to security vulnerabilities that cause servers to crash or applications to provide access to unauthorized users, says Aviram Jenik, CEO of Beyond Security.

With last month's release of beStorm 2.0, Beyond Security is introducing "smart" black-box testing, which begins by running a small group of common fuzzing attack vectors and then uses a proprietary technique to extrapolate a larger group of vulnerabilities. Hackers often employ only slight variations on familiar fuzzing attacks.

The technique is especially suited to testing devices with limited processing power such as printers and voice-over-IP phones.

Once the initial phase is completed, beStorm then attempts to fuzz every combination within a protocol in order to find unknown vulnerabilities, Jenik says. For example, with FTP, there are 10 million testing scenarios that are valid within the protocol.

Beyond Security now packages beStorm as Windows server software but plans eventually to target value-added resellers and integrators with a plug-and-play appliance, Jenik says. "You could plug in particular protocols or applications you wanted to test, and this could become part of the life-cycle management of the various protocol tests that you run," he adds.

Pricing for the software starts at $7,500.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Future IT Teams Will Include More Non-Traditional Members
Lisa Morgan, Freelance Writer,  4/1/2020
COVID-19: Using Data to Map Infections, Hospital Beds, and More
Jessica Davis, Senior Editor, Enterprise Apps,  3/25/2020
Enterprise Guide to Robotic Process Automation
Cathleen Gagne, Managing Editor, InformationWeek,  3/23/2020
Register for InformationWeek Newsletters
Current Issue
IT Careers: Tech Drives Constant Change
Advances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market. Read it today!
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll