09.11.2014 Views

defensics for penetration testers - Codenomicon

defensics for penetration testers - Codenomicon

defensics for penetration testers - Codenomicon

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FOR PENETRATION TESTING<br />

Why use DEFENSICS in Penetration testing?<br />

DEFENSICS is especially designed <strong>for</strong> <strong>penetration</strong> <strong>testers</strong>.<br />

It contains general purpose XML and Traffic capture fuzzers,<br />

enabling you to test both protocol and application level<br />

implementations, and model-based fuzzers <strong>for</strong> other frequently<br />

used protocols like HTTP, SSL/TLS and FTP, providing you with<br />

all the tools you need to per<strong>for</strong>m more thorough <strong>penetration</strong><br />

testing quickly and easily.<br />

» AUTOMATED PENETRATION TESTING:<br />

<strong>Codenomicon</strong> DEFENSICS tools are fully automated software based<br />

solutions that are easy to integrate to your own security auditing<br />

processes. The resulting tests are faster and more comprehensive.<br />

» BUILT- IN INTELLIGENCE:<br />

Penetration testing requires substantial knowledge of protocols<br />

and systems from the <strong>testers</strong>, whereas in Fuzzing the expertise can<br />

be built into the tools. Relatively inexperienced <strong>testers</strong> can per<strong>for</strong>m<br />

the fuzz tests, making it easier to build up the <strong>penetration</strong> test<br />

team. <strong>Codenomicon</strong>’s model-based fuzzers:<br />

• COVER the entire protocol, and document every tested feature<br />

and resulted test case.<br />

• TARGET protocol areas most susceptible to vulnerabilities to<br />

shorten test run times.<br />

• IDENTIFY vulnerabilities in deeper protocol layers.<br />

• GENUINELY INTEROPERATE with systems under test (SUT).<br />

• DO NOT REQUIRE TEST TOOL CREATION OR<br />

MAINTENANCE EFFORT<br />

» TEST ANY PROTOCOL:<br />

The <strong>Codenomicon</strong> Traffic Capture Fuzzer can be used to test all IPbased<br />

traffic. The tests are generated from captured messages, thus<br />

no protocol specifications are needed to create the tests. It is the<br />

only tool available <strong>for</strong> testing proprietary protocols and protocol<br />

extensions. It can also be used to test systems in the very early<br />

stages of development.<br />

» TEST ANY LAYER:<br />

Tests should cover all layers of protocols in all infrastructure<br />

components, including browsers, load balancers, firewalls and<br />

application servers. DEFENSICS has ready-made off-the-shelf<br />

test suites <strong>for</strong> testing all communication layers, from IPv4 and IPv6<br />

to application protocols like HTTP and SIP. Both client and server<br />

implementations can be tested.<br />

» TEST XML APPLICATIONS THOROUGHLY:<br />

XML is widely used, but its complexity not only makes it prone<br />

vulnerabilities, but also hard to test. <strong>Codenomicon</strong>’s intelligent<br />

stateful fuzzers can genuinely interact with the tested system<br />

and test each layer individually, thus they achieve unparalleled<br />

efficiency in finding vulnerabilities.<br />

» FAST TEST RUNS:<br />

The <strong>Codenomicon</strong> Penetration Test Suite package enables you to<br />

test faster and more effectively by:<br />

• EXECUTING MULTIPLE TESTS simultaneously<br />

• TARGETING TESTS using MODEL-BASED FUZZERS<br />

and the NETWORK ANALYZER<br />

Example Penetration Test Process:<br />

MAP THE ATTACK SURFACE<br />

Using the <strong>Codenomicon</strong> Network Analyzer to<br />

map real network traffic and to determine what<br />

needs to be tested. Test external communications,<br />

and client-side threats in the system.<br />

PERFORM SYSTEMATIC TESTING<br />

DEFENSICS supports 150+ industry standard<br />

protocols with ready-made model-based fuzzers.<br />

The general purpose Traffic Capture Fuzzer and<br />

XML Fuzzer will enable you to test any protocol<br />

and XML-application.<br />

REPRODUCE AND REPORT<br />

All vulnerabilities found using DEFENSICS<br />

can be easily reproduced, and the tools will<br />

automatically generate both technical and<br />

management documentation <strong>for</strong> all tests<br />

and the entire test plan.<br />

CODENOMICON Ltd. | info@codenomicon.com | www.codenomicon.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!