Barron Rosborough, 7/31/18 11:21 AM

Black box testing for the enterprise

A multi-protocol fuzzer for black box testing

下彩网昂 www.1ikyk.com.cn beSTORM represents a new approach to security auditing. This new approach is sometimes called "fuzzing" or "fuzz testing" and can be used for securing in-house software applications and devices, as well as testing the applications and devices of external vendors.

Most security holes found today in products and applications are discovered by automated, black box software testing. beSTORM tries virtually every attack combination, intelligently starting with the most likely scenarios and detects application anomalies which indicate a successful attack. Thus security holes can be found with little user intervention.

 

black box testing with beSTORM

 

Comprehensive security testing for applications and hardware

Previously available only to governments and large corporations, beSTORM has established a long and well documented history of identifying security issues in network equipment and software. Simple to use but powerful enough to have been deployed by the military, beSTORM can replace dozens of hard to use or poorly supported and documented tools and provides a standard, reliable and repeatable security testing process that businesses of any size can incorporate into their software QA process.

Technically, beSTORM is a commercial, black box, intelligent fuzzer. It is used in a lab environment to test application security during development or to certify software and networked hardware prior to deployment. It comes with complete technical and developmental support, does not need or use source code and delivers fast results by testing the most common, most likely failure scenarios first and then branching out into a near infinite range of attack variations. Contact us today and get your software security testing questions answered.

How beSTORM black box testing works

  • Innovative: beSTORM performs exhaustive analysis to uncover new and unknown vulnerabilities in any software. It's unique and powerful testing algorithm focuses on attacks that are most likely to succeed, thus producing results far faster than simple brute force testing. beSTORM does not need the source code to analyze and uncover vulnerabilities.
  • Multi-Protocol: All Internet protocols can be tested using beSTORM - even complex protocols such as SIP (used in Voice over IP products) are supported.
  • Intelligent Fuzzing: Special attack prioritizing algorithms allow beSTORM to start with the attacks most likely to succeed, depending on the specific protocol that is audited. This saves considerable time during the audit process and highlights the most important problems, first.
  • Accurate Reporting: beSTORM checks the application externally by triggering actual attacks. Vulnerabilities are reported only if an actual attack has been successful, for example if a buffer overflow has been triggered. Simply put, beSTORM emulates an attacker. If the attacker cannot carry out the attack, beSTORM will not report it, effectively reducing the number of false positives.
  • Fast and Deep Testing: beSTORM is able to convert the protocol standard text to automated set of tests by converting the BNF description used in technical RFC documents to attack language. This ensures that the entire functionality of the system is checked, and enables to quickly find bugs that otherwise surface only months or years after the product is released to the market.
  • Comprehensive Analysis: beSTORM detects vulnerabilities by attaching to the audited process and detecting even the slightest anomalies. By doing so, beSTORM can find attacks as subtle as 'off-by-one' attacks, as well as buffer overflow attacks that do not crash the application.
  • Scaleable: beSTORM is extremely scaleable, with the ability to use multiple processors or multiple machines to parallelize the audit and substantially reduce the testing duration.
  • Extensible: beSTORM tests the protocol rather than the product, and therefore can be used to test extremely complicated products with a large code base.
  • Flexible: beSTORM's protocol analysis can be easily extended to support your proprietary protocol.
  • Language Independent: beSTORM tests the binary application, and is therefore completely indifferent to the programming language or system libraries used. beSTORM will report the exact interaction that triggers the vulnerability allowing programmers to debug the application with whatever development environment they wish.

Automated binary analysis

beSTORM includes an automated engine that can parse through binary data, decode ASN.1 structures as well as length value pairs:

 

binary analysis during black box testing

 

beSTORM automatically parses binary data

Automated textual analysis

beSTORM includes an automated engine that can parse through textual data, recognize multiple forms of data encoding, as well as decode XML structures:

 

text analysis during black box testing

 

beSTORM automatically parses text data

Custom protocols

For proprietary or custom protocols beSTORM includes a graphical interface that can be used to automatically learn and then test any protocol:

 

using black box testing on propietary protocols

 

beSTORM tests proprietary protocols

Advanced debugging and stack tracing

beSTORM includes an advanced debugging and stack tracing engine that can not only discover potential coding issues, but also shows the stack trace that brought you to the specific coding issue:

 

stack tracing during black box testing

 

beSTORM stack tracing engine

Advantages of beSTORM black box testing

  • Integrates with the existing development strategy: Search for security vulnerabilities during development or as part of your QA process.
  • Source code not necessary: No need for source code - perfect for auditing 3rd party applications.
  • Reproducible: Vulnerabilities are searched for in a methodical way which can be reproduced.

 

black box testing application diagram

 

beSTORM application diagram

For more information call, email or use the form on this page.

  • “有个景区叫宁夏”2018景区推介及产品政策在太原发布 2019-04-23
  • 工厂暴力拆解蓄电池50吨硫酸排地下 14名嫌犯被抓 2019-04-22
  • 争议!日球员破门前手球在先 竟无上港球员抗议 2019-04-22
  • 全军启动826门军事职业教育重点课程建设任务 2019-04-21
  • 打造“互联网+”,共享经济改变百姓生活 2019-04-21
  • 天津自贸试验区机场片区:融合联动 特色发展 2019-04-20
  • 金华:舞动世界杯 我是颠球王 2019-04-20
  • 端午期间 南昌站与南昌西站共加开旅客列车45列 2019-04-19
  • An advance booking of two hours can be made for Yangtze River Cableway tickets - Chongqing News - CQNEWS 2019-04-19
  • 长治旅游推介会走进晋城、郑州、安阳 2019-04-18
  • 一“证”在手  产品畅行海内外 2019-04-17
  • 庆祝中国人民解放军建军90周年阅兵在朱日和联合训练基地隆重举行 2019-04-17
  • 看见什么有用?[猜想] 2019-04-16
  • 青春建功新时代 2018年“创青春”浙江省青年创新创业大赛启动 2019-04-16
  • 马克思主义何以改变人类历史发展进程 2019-04-15
  • 153| 835| 395| 978| 513| 542| 476| 806| 124| 452|