SlideShare a Scribd company logo
Beyond Security Product presentation   beSTORM Amit Shirolkar Avi Electronics & Networks Pvt Ltd www.AviElectronic.com www.BeyondSecurity.com www.SecuriTeam.com
About Beyond Security Provides a vulnerability assessment & self-management solutions Enables continuous network, server, database & application security Operates SecuriTeam.com, the 2nd largest IT security portal (1.5 million page views/month)‏ Privately held & profitable R&D office in Israel, sales offices in McLean, VA and Chicago, IL Sales via distribution channels in 16 countries
SecuriTeam.com - IT security portal Established in 1998 by Beyond Security's founders Trusted by hackers & security pros Provides a sustainable competitive advantage because Beyond Security learns about vulnerabilities first directly from hackers 2.3 M unique visitors in 2004 1.5 M monthly page views
Intellectual Property based on 5 years of ongoing R&D development Compiling  a knowledgebase of 7,500 vulnerabilities & over 3,000 attack scripts Knowledge acquired from SecuriTeam.com since 1998 Participated in security product reviews of some of the most well-known vendors Discovered and documented dozens of security holes by our own R&D team (see: http://www.securiteam.com/advisories/)‏ Beyond Security knows vulnerabilities
What is a vulnerability? A security weakness in an application, operating system, network device or hardware This weakness can be exploited to cause harm Hundreds of vulnerabilities uncovered every year, many of them are actively exploited With development cycles growing shorter, more vulnerabilities surface Detecting vulnerabilities during development is  difficult Detecting them after development is  costly
Fuzzing – a Quick Overview From Wikipedia: Fuzz testing is a software testing technique. The basic idea is to attach the inputs of a program to a source of random data. If the program fails (for example, by crashing, or by failing built-in code assertions), then there are defects to correct. The great advantage of fuzz testing is that the test design is extremely simple, and free of preconceptions about system behavior.
Types of Fuzzing There are two main type of fuzzers Standalone tools - specifically designed for a single protocol A non generic fuzzer for protocols such as: SNMP SMTP etc Fuzzing Framework A generic fuzzer that supports adding of additional protocols with ease
Types of Fuzzing - Continued Manual fuzzing Use normal client/server Observe what happens Look for interesting data (size fields, ...)‏ Change some of this data Observe what happens Semi-automatic fuzzing Have a tiny script/program Do one run, see what happens Automatic fuzzing: Use a script/program and iterate over a lot of possible outputs (can be an endless loop)‏ Just wait till something crashes
Enter SPIKE (1 st  Generation Fuzzing)‏ SPIKE is a preliminary tool; unstable and finds nearly no vulnerabilities SPIKE deserves a lot of credit though, for it introduced Block-Based Protocol Analysis
2 nd  Generation Fuzzing What is a 2 nd  generation fuzzer? Stable fuzzer - can run continuously for weeks or months Actually find vulnerabilities First test in ways that are likely to find results (80/20 – cover 20% which is likely to find 80% of the problems)‏ Test with hundreds of thousands of attempts equal to tens of millions Don’t just “throw AAAAA’s” Distributed fuzzing Discover flaws that don't cause crashes, by cause unexpected behavior Generate intricate sessions – connect, get something from server, use it for next session ... Support output forms of not just sockets – i.e. files ...
What is beSTORM? 1/3 A unique approach to finding security holes during development: A 2 nd  generation fuzzer Finds vulnerabilities by actually trying the attacks and seeing if they were successful Tests at the network/protocol level Exhaustively testing the full test-space rather than focusing on a limited number of scenarios Stable and repeatable testing for security compliance checking
What is beSTORM? 2/3 beSTORM's strong points Generates not just malformed packets but also sessions, malformed sessions include: Out of order sessions – the order at which packets from a session are sent is reversed or “randomized” Overlapping sessions – the follow-up packet re-initiates or utilizes different values that it should have Missing sessions – the session is never completed, or properly closed
What is beSTORM? 3/3 beSTORM generates session containing: One or more malformed value found inside the packet(s) – non AlphaNumeric data if such is expected One or more malformed relationship between values found inside the packet(s) – Size, description , etc related Oversized value Undersized value Non-expected value – if a session number should have been written, a non-relevant data is provided, such as in the case of reuse of previously closed session number
How Does beSTORM Work? 1/3 beSTORM works by fuzzing such protocols as: HTTP SIP (VoIP)‏ FTP, SMTP, etc Practically every possible protocol combination is sent to the application – in some cases as much as 10 10  or more combinations  Covers malformed requests as well as obscure protocol features
How Does beSTORM Work? 2/3 A powerful monitor detects if even the slightest buffer overflow, format string, or similar problem occurred Runs automatically until the protocol is exhausted, trying the most probable combinations first beSTORM modules are built to recognize the protocols' inner workings and to know whether one value affects another one This causes beSTORM to further test it with the relation of other values
How Does beSTORM Work? 3/3 You can defined rules to exclude certain scenarios from occurring Don't overflow a certain value Don't try to send data in out-of-order manner etc Each module has its own rules which allows it to go through certain more probable combinations first For HTTP Overflow the URI Overflow the Host header etc
beSTORM at Work The following screenshot illustrates a malformed HTTP packets: As can be seen more than one segment of the is malformed
beSTORM Eliminates Vulnerabilities The only technology to search and find security holes: During development Without requiring the source code In a methodical way that can be reproduced Designed to be used by the developers or QA personnel
Competition Source-code audit tools: Very high false-positives rate Not scalable Do not always integrate well with source-versioning applications used by customers Cannot be used for certification/formal validation Consultants (home-made tools): Manual checks Expensive Cannot be done on frequent basis Requires disclosing possibly sensitive information with a 3 rd  party
IIS Case Study When testing Microsoft's IIS web server,  beSTORM detected the first buffer overflow vulnerability after  only 4 ½ minutes   During those 4 ½ minutes, 160,000 attack combinations were tested The buffer overflow was pinpointed and can be reproduced The vulnerability leads to remote compromise of the machine running IIS
ISA Case Study When testing Microsoft's ISA server,  beSTORM detected the first logging error vulnerability after  only 10 minutes   During those 10 minutes, 500,000 attack combinations were tested The logging error was pinpointed and reproduced by Microsoft, an advisory is in process of being released The vulnerability allows attackers to corrupt the ISA server's log file with arbitrary characters that are normally filtered out
Aladdin Case Study  Security leader turns to Beyond Security for security validation Aladdin Knowledge Systems (ALDN) uses beSTORM to perform a security audit for their eSafe email content security solution to confirm their product is free from vulnerabilities or security weaknesses beSTORM's SMTP module contains over 500,000 attack combinations
Aladdin Case Study  Security leader turns to Beyond Security for security validation “ Beyond Security's vulnerability audit confirms... eSafe 4 offers our customers a virtually impregnable defense against email-based security threats.” Shimon Gruper, EVP Internet Technologies, Aladdin Knowledge Systems
Clients & Partners

More Related Content

PPT
Automated Penetration Testing With Core Impact
PPT
MIT-6-determina-vps.ppt
PDF
Core Impact Pro R1-Release Overview
PDF
Defending Servers - Cyber security webinar part 3
PPTX
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
PPT
Running Java safely
PPTX
Application Virtualization
PPTX
Automated Penetration Testing With Core Impact
MIT-6-determina-vps.ppt
Core Impact Pro R1-Release Overview
Defending Servers - Cyber security webinar part 3
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Running Java safely
Application Virtualization

What's hot (20)

PPTX
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
PPT
Analyzing internetsecurity
PPTX
Web applications security conference slides
PDF
Reversing & malware analysis training part 10 exploit development basics
PPTX
Injection flaws
PPT
Automated Penetration Testing With The Metasploit Framework
PPTX
Advanced Malware Analysis Training Session 8 - Introduction to Android
PPT
Testingfor Sw Security
PPTX
How websites are attacked
PPT
Security Testing
PPTX
Eirtight writing secure code
PPTX
Confidentiality policies UNIT 2 (CSS)
PPT
70-272 Chapter10
PPTX
Dll preloading-attack
PPT
Ch08 Microsoft Operating System Vulnerabilities
PPT
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
PDF
Ceh v5 module 14 sql injection
PPTX
Anti-Virus Evasion Techniques and Countermeasures
PDF
Elastix network security guide
PDF
Security principles and experiences from security audit (for .NET developers)
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Analyzing internetsecurity
Web applications security conference slides
Reversing & malware analysis training part 10 exploit development basics
Injection flaws
Automated Penetration Testing With The Metasploit Framework
Advanced Malware Analysis Training Session 8 - Introduction to Android
Testingfor Sw Security
How websites are attacked
Security Testing
Eirtight writing secure code
Confidentiality policies UNIT 2 (CSS)
70-272 Chapter10
Dll preloading-attack
Ch08 Microsoft Operating System Vulnerabilities
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
Ceh v5 module 14 sql injection
Anti-Virus Evasion Techniques and Countermeasures
Elastix network security guide
Security principles and experiences from security audit (for .NET developers)
Ad

Similar to Be Storm - Automated Application/Software Vulnerability Testing (20)

PPT
BeStorm Introduction
PDF
Fuzzing and You: Automating Whitebox Testing
PPTX
Fuzzing101: Unknown vulnerability management for Telecommunications
PDF
Software Security Engineering (Learnings from the past to fix the future) - B...
PDF
Owasp tds
PDF
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
PDF
Zen and the art of Security Testing
PDF
Agile Testing Pasadena JUG Aug2009
PPT
Security Testing
PPT
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
PDF
The Most Important Thing: How Mozilla Does Security and What You Can Steal
PPTX
Ebu class edgescan-2017
PDF
How to find Zero day vulnerabilities
PPTX
Pentesting Tips: Beyond Automated Testing
PPTX
Test execution
PPT
BSidesDC 2016 Beyond Automated Testing
PDF
Cyberlands Sales Deck
PPT
Beyond Automated Testing - RVAsec 2016
PDF
Moving to Modern DevOps with Fuzzing and ML - DevOps Next
BeStorm Introduction
Fuzzing and You: Automating Whitebox Testing
Fuzzing101: Unknown vulnerability management for Telecommunications
Software Security Engineering (Learnings from the past to fix the future) - B...
Owasp tds
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Zen and the art of Security Testing
Agile Testing Pasadena JUG Aug2009
Security Testing
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
The Most Important Thing: How Mozilla Does Security and What You Can Steal
Ebu class edgescan-2017
How to find Zero day vulnerabilities
Pentesting Tips: Beyond Automated Testing
Test execution
BSidesDC 2016 Beyond Automated Testing
Cyberlands Sales Deck
Beyond Automated Testing - RVAsec 2016
Moving to Modern DevOps with Fuzzing and ML - DevOps Next
Ad

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Encapsulation theory and applications.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Machine Learning_overview_presentation.pptx
Big Data Technologies - Introduction.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
“AI and Expert System Decision Support & Business Intelligence Systems”
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
sap open course for s4hana steps from ECC to s4
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Encapsulation theory and applications.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Programs and apps: productivity, graphics, security and other tools
Machine Learning_overview_presentation.pptx

Be Storm - Automated Application/Software Vulnerability Testing

  • 1. Beyond Security Product presentation beSTORM Amit Shirolkar Avi Electronics & Networks Pvt Ltd www.AviElectronic.com www.BeyondSecurity.com www.SecuriTeam.com
  • 2. About Beyond Security Provides a vulnerability assessment & self-management solutions Enables continuous network, server, database & application security Operates SecuriTeam.com, the 2nd largest IT security portal (1.5 million page views/month)‏ Privately held & profitable R&D office in Israel, sales offices in McLean, VA and Chicago, IL Sales via distribution channels in 16 countries
  • 3. SecuriTeam.com - IT security portal Established in 1998 by Beyond Security's founders Trusted by hackers & security pros Provides a sustainable competitive advantage because Beyond Security learns about vulnerabilities first directly from hackers 2.3 M unique visitors in 2004 1.5 M monthly page views
  • 4. Intellectual Property based on 5 years of ongoing R&D development Compiling a knowledgebase of 7,500 vulnerabilities & over 3,000 attack scripts Knowledge acquired from SecuriTeam.com since 1998 Participated in security product reviews of some of the most well-known vendors Discovered and documented dozens of security holes by our own R&D team (see: http://www.securiteam.com/advisories/)‏ Beyond Security knows vulnerabilities
  • 5. What is a vulnerability? A security weakness in an application, operating system, network device or hardware This weakness can be exploited to cause harm Hundreds of vulnerabilities uncovered every year, many of them are actively exploited With development cycles growing shorter, more vulnerabilities surface Detecting vulnerabilities during development is difficult Detecting them after development is costly
  • 6. Fuzzing – a Quick Overview From Wikipedia: Fuzz testing is a software testing technique. The basic idea is to attach the inputs of a program to a source of random data. If the program fails (for example, by crashing, or by failing built-in code assertions), then there are defects to correct. The great advantage of fuzz testing is that the test design is extremely simple, and free of preconceptions about system behavior.
  • 7. Types of Fuzzing There are two main type of fuzzers Standalone tools - specifically designed for a single protocol A non generic fuzzer for protocols such as: SNMP SMTP etc Fuzzing Framework A generic fuzzer that supports adding of additional protocols with ease
  • 8. Types of Fuzzing - Continued Manual fuzzing Use normal client/server Observe what happens Look for interesting data (size fields, ...)‏ Change some of this data Observe what happens Semi-automatic fuzzing Have a tiny script/program Do one run, see what happens Automatic fuzzing: Use a script/program and iterate over a lot of possible outputs (can be an endless loop)‏ Just wait till something crashes
  • 9. Enter SPIKE (1 st Generation Fuzzing)‏ SPIKE is a preliminary tool; unstable and finds nearly no vulnerabilities SPIKE deserves a lot of credit though, for it introduced Block-Based Protocol Analysis
  • 10. 2 nd Generation Fuzzing What is a 2 nd generation fuzzer? Stable fuzzer - can run continuously for weeks or months Actually find vulnerabilities First test in ways that are likely to find results (80/20 – cover 20% which is likely to find 80% of the problems)‏ Test with hundreds of thousands of attempts equal to tens of millions Don’t just “throw AAAAA’s” Distributed fuzzing Discover flaws that don't cause crashes, by cause unexpected behavior Generate intricate sessions – connect, get something from server, use it for next session ... Support output forms of not just sockets – i.e. files ...
  • 11. What is beSTORM? 1/3 A unique approach to finding security holes during development: A 2 nd generation fuzzer Finds vulnerabilities by actually trying the attacks and seeing if they were successful Tests at the network/protocol level Exhaustively testing the full test-space rather than focusing on a limited number of scenarios Stable and repeatable testing for security compliance checking
  • 12. What is beSTORM? 2/3 beSTORM's strong points Generates not just malformed packets but also sessions, malformed sessions include: Out of order sessions – the order at which packets from a session are sent is reversed or “randomized” Overlapping sessions – the follow-up packet re-initiates or utilizes different values that it should have Missing sessions – the session is never completed, or properly closed
  • 13. What is beSTORM? 3/3 beSTORM generates session containing: One or more malformed value found inside the packet(s) – non AlphaNumeric data if such is expected One or more malformed relationship between values found inside the packet(s) – Size, description , etc related Oversized value Undersized value Non-expected value – if a session number should have been written, a non-relevant data is provided, such as in the case of reuse of previously closed session number
  • 14. How Does beSTORM Work? 1/3 beSTORM works by fuzzing such protocols as: HTTP SIP (VoIP)‏ FTP, SMTP, etc Practically every possible protocol combination is sent to the application – in some cases as much as 10 10 or more combinations Covers malformed requests as well as obscure protocol features
  • 15. How Does beSTORM Work? 2/3 A powerful monitor detects if even the slightest buffer overflow, format string, or similar problem occurred Runs automatically until the protocol is exhausted, trying the most probable combinations first beSTORM modules are built to recognize the protocols' inner workings and to know whether one value affects another one This causes beSTORM to further test it with the relation of other values
  • 16. How Does beSTORM Work? 3/3 You can defined rules to exclude certain scenarios from occurring Don't overflow a certain value Don't try to send data in out-of-order manner etc Each module has its own rules which allows it to go through certain more probable combinations first For HTTP Overflow the URI Overflow the Host header etc
  • 17. beSTORM at Work The following screenshot illustrates a malformed HTTP packets: As can be seen more than one segment of the is malformed
  • 18. beSTORM Eliminates Vulnerabilities The only technology to search and find security holes: During development Without requiring the source code In a methodical way that can be reproduced Designed to be used by the developers or QA personnel
  • 19. Competition Source-code audit tools: Very high false-positives rate Not scalable Do not always integrate well with source-versioning applications used by customers Cannot be used for certification/formal validation Consultants (home-made tools): Manual checks Expensive Cannot be done on frequent basis Requires disclosing possibly sensitive information with a 3 rd party
  • 20. IIS Case Study When testing Microsoft's IIS web server, beSTORM detected the first buffer overflow vulnerability after only 4 ½ minutes During those 4 ½ minutes, 160,000 attack combinations were tested The buffer overflow was pinpointed and can be reproduced The vulnerability leads to remote compromise of the machine running IIS
  • 21. ISA Case Study When testing Microsoft's ISA server, beSTORM detected the first logging error vulnerability after only 10 minutes During those 10 minutes, 500,000 attack combinations were tested The logging error was pinpointed and reproduced by Microsoft, an advisory is in process of being released The vulnerability allows attackers to corrupt the ISA server's log file with arbitrary characters that are normally filtered out
  • 22. Aladdin Case Study Security leader turns to Beyond Security for security validation Aladdin Knowledge Systems (ALDN) uses beSTORM to perform a security audit for their eSafe email content security solution to confirm their product is free from vulnerabilities or security weaknesses beSTORM's SMTP module contains over 500,000 attack combinations
  • 23. Aladdin Case Study Security leader turns to Beyond Security for security validation “ Beyond Security's vulnerability audit confirms... eSafe 4 offers our customers a virtually impregnable defense against email-based security threats.” Shimon Gruper, EVP Internet Technologies, Aladdin Knowledge Systems

Editor's Notes

  • #25: - A new huge hole every 6-9 months -