Black Box Software Testing
beSTORM performs comprehensive software security analysis and will
discover vulnerabilities during development or after release.
beSTORM represents a new approach to security auditing. This new
approach is sometimes called "fuzzing" or "fuzz testing" and can be
used for securing in-house software applications and devices, as well
as testing the applications and devices of external vendors.
Most security holes found today in products and applications are
discovered by automated, blackbox software testing. beSTORM tries
virtually every attack combination, intelligently starting with the
most likely scenarios and detects application anomalies which indicate
a successful attack. Thus security holes can be found almost without
How beSTORM Black Box Security
beSTORM performs exhaustive analysis to uncover new and unknown
vulnerabilities in any software. It's unique and powerful testing
algorithm focuses on attacks that are most likely to succeed, thus
producing results far faster than simple brute force testing. beSTORM
does not need the source code to analyse and uncover vulnerabilities.
- Broad range
All Internet protocols can be tested using beSTORM - even complex
protocols such as SIP (used in Voice over IP products) are supported.
- Attack Prioritization
Special attack prioritising algorithms allow beSTORM to start with the
attacks most likely to succeed, depending on the specific protocol that
is audited. This saves considerable time during the audit process and
highlights the most important problems, first.
- Report accuracy
beSTORM checks the application externally by triggering actual attacks.
Vulnerabilities are reported only if an actual attack has been
successful, for example if a buffer overflow has been triggered. Simply
put, beSTORM emulates an attacker. If the attacker cannot carry out the
attack, beSTORM will not report it, effectively reducing the number of
- Protocol compliance
beSTORM is able to convert the protocol standard text to automated set
of tests by converting the BNF description used in technical RFC
documents to attack language. This ensures that the entire
functionality of the system is checked, and enables to quickly find
bugs that otherwise surface only months or years after the product is
released to the market.
- Comprehensive analysis
beSTORM detects vulnerabilities by attaching to the audited process and
detecting even the slightest anomalies. By doing so, beSTORM can find
attacks as subtle as 'off-by-one' attacks, as well as buffer overflow
attacks that do not crash the application.
beSTORM is extremely scalable, with the ability to use multiple
processors or multiple machines to parallelize the audit and
substantially reduce the testing duration.
beSTORM tests the protocol rather than the product, and therefore can
be used to test extremely complicated products with a large code base.
beSTORM's protocol analysis can be easily extended to support your
- Language independent
beSTORM tests the binary application, and is therefore completely
indifferent to the programming language or system libraries used.
beSTORM will report the exact interaction that triggers the
vulnerability, and the programmers can now debug the application with
whatever development environment they wish to see what causes the fault.