Software Uses Hacker Tactic To Find Security Vulnerabilities - InformationWeek
IoT
IoT
Feature
News
10/20/2006
02:20 PM
50%
50%

Software Uses Hacker Tactic To Find Security Vulnerabilities

The idea behind the technique, called "fuzzing," is to take a certain request--between a Web browser and a server, for example--and modify it so that it's slightly different from what one side expects.

Know thy enemy and his methods. A security vendor is putting that philosophy to work by co-opting a common hacker technique to help software developers and testers weed out glitches in applications that could become targets of exploits.

The idea behind the technique, called fuzzing, is to take a certain request--between a Web browser and a server, for example--and modify it so that it's slightly different from what one side expects. Although time-consuming, fuzzing can point to security vulnerabilities that cause servers to crash or applications to provide access to unauthorized users, says Aviram Jenik, CEO of Beyond Security.

With last month's release of beStorm 2.0, Beyond Security is introducing "smart" black-box testing, which begins by running a small group of common fuzzing attack vectors and then uses a proprietary technique to extrapolate a larger group of vulnerabilities. Hackers often employ only slight variations on familiar fuzzing attacks.

The technique is especially suited to testing devices with limited processing power such as printers and voice-over-IP phones.

Once the initial phase is completed, beStorm then attempts to fuzz every combination within a protocol in order to find unknown vulnerabilities, Jenik says. For example, with FTP, there are 10 million testing scenarios that are valid within the protocol.

Beyond Security now packages beStorm as Windows server software but plans eventually to target value-added resellers and integrators with a plug-and-play appliance, Jenik says. "You could plug in particular protocols or applications you wanted to test, and this could become part of the life-cycle management of the various protocol tests that you run," he adds.

Pricing for the software starts at $7,500.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
2018 State of the Cloud
2018 State of the Cloud
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
News
Enterprises to Bump Up IT Spending in 2019
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief,  9/12/2018
News
AIOps to Drive Big IT Pivot
Jessica Davis, Senior Editor, Enterprise Apps,  9/11/2018
Commentary
AWS vs. Azure: Users Share Their Experiences
Guest Commentary, Guest Commentary,  9/7/2018
Register for InformationWeek Newsletters
Video
Current Issue
The Next Generation of IT Support
The workforce is changing as businesses become global and technology erodes geographical and physical barriers.IT organizations are critical to enabling this transition and can utilize next-generation tools and strategies to provide world-class support regardless of location, platform or device
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll