0% found this document useful (0 votes)
55 views2 pages

Defensics Fuzz Testing

Defensics is a comprehensive testing platform designed to identify and remediate unknown vulnerabilities in software and devices, featuring pre-built test suites and an intuitive user interface. It supports over 290 network protocols and utilizes fuzz testing to expose software defects more effectively than traditional methods. By proactively addressing vulnerabilities, Defensics helps organizations mitigate risks and reduce costs associated with security breaches.

Uploaded by

jonjaballe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views2 pages

Defensics Fuzz Testing

Defensics is a comprehensive testing platform designed to identify and remediate unknown vulnerabilities in software and devices, featuring pre-built test suites and an intuitive user interface. It supports over 290 network protocols and utilizes fuzz testing to expose software defects more effectively than traditional methods. By proactively addressing vulnerabilities, Defensics helps organizations mitigate risks and reduce costs associated with security breaches.

Uploaded by

jonjaballe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DEFENSICS® DATASHEET

Defensics is a powerful testing platform that enables developers and asset owners to
®

proactively discover and remediate unknown vulnerabilities in software and devices.

KEY FEATURES

• Out-of-the-box functionality: Pre-built test suites relieve


the responsibility and burden of manual test creation and
maintenance.

• Ease of use: Intuitive user interface makes advanced


testing and remediation easy for anyone.

• Clear paths to remediation: Remediation packages


provide detailed documentation and workflows, outlining
clear paths to remediation for your development team or
supplier.

Supported Protocols
(Not All Protocols Listed)
(MEF-16) H.248 NFS v4.0 / v4.1 SNMPv3
BACNET H.264 NHRP SOCKS
BFD H.264 RTP NTP SSH1
BFD H.323 OAM (802.3ah) SSH2
BGP4+ HTTP OCSP STP

Product Overview BICC/M3UA


Blueooth LE
IEC 60870-5-104
IEC 61850/Goose/
openFlow
OSPFv2
STUN
SunRPC
SV
Bluetooth IEC 61850/MMS OSPFv3 SyncEthernet
CAN Bus IEE1588 PTP PBB-TE Syslog
Managing Unknown Vulnerabilities: An Infinite Space Problem CFM IKEv2 PBT (802.1ah) Telnet
CIFS/SMB IMAP4 PCP TFTP
As technology continues to evolve and permeate the infrastructures that people and CIP IPMI PIM-SM/DM TLS 1.2
TLS/SSL 1.0/1.1,
CMP v2 IPSec PMIPv6
businesses rely on, mitigating unknown vulnerabilities in the software and devices that SSL3
Traffic Capture
COAP IPv4 POP3 Fuzzer
power our connected world is paramount. CWMP (TR-69) IPv6 PPPoE Trill
DHCP/BootP IS-IS Profinet DCP (PLC) TURN
Universal ASN.1
DHCPv6 ISAKMP/IKEv1 Profinet PTCP (PLC) BER
The Attack Surface is Expanding: Every networked application and device
Diameter ISASecure Solution RADIUS Universal Fuzzer
represents an opportunity for attack. Today, there are nearly 13 billion connected DICOM iSCSI RIP UPnP
DNP3 JSON format RIPng vCalendar format
devices, and by 2020 that number will rise to 25 billion. DNS Kerberos RSVP vCard format
DTLS L2TPv2/v3 RTP/RTCP/SRTP VRRP
DVMRPv1 LACP (802.3ad) RTSP WebApplication

The Stakes are Higher: Today, organizations depend on technology to process DVMRPv3
E-LMI
LDAPv3
LDP
S1AP
SCEP
WebSocket
Wi-Fi AP
sensitive information and perform essential functions. Unknown vulnerabilities in EAPoL/802.1x
ESTP
LLDP (802.1AB)
MAP
SCTP
SIP
Wi-Fi AP WPA
Wi-Fi Client
business-critical software and devices pose a significant threat because they cannot Ethernet MIME SIP-I Wi-Fi Client WPA
FCoE + FIP ModBus SMBv2 WMV
be addressed by traditional forms of security such as firewalls, IDP/IPS, etc. FIX MP4 SMBv3 WPA Enterprise
FTP MPLS SMPP SMS X.509v3
GARP 802.1D MQTT SMS PDU/File XML File

Power Lies in Prevention: The cost of addressing vulnerabilities increases GRE


GTPv0
MSDP
MSRP
SMS SMPP
SMTP
XML SOAP
XMPP

exponentially as you move further down the development lifecycle and supply chain. GTPv1
GTPv2-control
NetBIOS
NFS v2/v3
SNMP Trap
SNMPv2c

Proactively discovering and remediating unknown vulnerabilities prevents attacks and


reduces costs.

© 2016
2015 Synopsys
DEFENSICS® DATASHEET

Key Features: Test Suite Reference Bundles


• Fully-automated testing platform with pre-built test suites relieve the responsibility Core Internet: IPv4 (TCP, UDP, IPv4, ICMP, IGMP, ARP), IPv6 (TCP,
and burden of manual test creation. UDP, IPv6, ICMPv6), DNS, DNSSEC, NTP Client, NTP Server, DHCP/
BOOTP Client, DHCP/ BOOTP Server, HTTP Server, HTTP Client,
• Utilizes various techniques to generate effective test cases, including “template,” FTP Server, DHCPv6 Client, DHCPv6 Server, FTP Client, NetBIOS,
PMIPv6 Client, PMIPv6 Server
“generational,” and “evolutionary” test engines.
Net Management: HTTP Server, HTTP Client, TLS/SSL, TLS
• Supports advanced techniques for detecting failures and anomalous behavior, 1.2, Telnet Server, SSH1 Server, SSH2 Server, SNMPv1/v2 Server,
SNMPv3 Server, TFTP Server, UPnP Server, Syslog, SNMP Trap
including valid case or functional response, resource monitoring, dynamic binary
Routing: IS-IS, DVMRP, GRE, OSPFv2, OSPFv3, PIM-SM/DM, RSVP,
analysis, and source code instrumentation. VRRP, BGP4, RIP, RIPng, MPLS/LDP, HSRP, NHRP, CDP, OpenFlow

• Advanced test suites available for 290+ network protocols, file formats, and other Remote Access: EAPOL Server, PPPoE, Diameter Server, Diameter
Client, LDAPv3 Server, TACACS+ Server, TACACS+ NAS, RADIUS
interfaces. Test suites are continuously added, improved, and supported by a (Server, Client), Kerberos Server
dedicated team of test developers. VPN: IPsec, SSH1 Server, SSH2 Server, TLS/SSL, TLS 1.2, ISAKMP/
IKEv1 (Client, Server), IKEv2, OCSP (Client, Server), L2TPv2, X.509
• Thorough documentation and reporting features allow Defensics to identify the root
VoIP/IMS: SCTP, H.248, H.323, RTSP (Client, Server), TLS/SSL, TLS
cause of critical failures in such a way that they are repeatable, easy to understand, 1.2, SIP UAS, SIP UAC, SigComp, RTP/RTCP/SRTP, MGCP, UPnP
and can be shared with the stakeholders involved in the remediation process. Server, X.509, BICC, SIP TT

3G/4G LTE: SCTP, GRE, IPsec, Diameter Server, Diameter Client,


Bringing the Unknown Into View LDAP Server, TLS/SSL, TLS 1.2, SIP UAS, SIP UAC, GTPv1, GTPv0,
RADIUS (Server, Client), GTPv2, SMPP, SMS/SMPP, SMS/PDU,
PMIPv6
With security and transparency emerging as Board-level mandates, there is a renewed
Digital Media: Audio (AIFF, AU, AMR, IMY, MP3, VOC, WAV), Images
urgency to find the vulnerabilities that put business performance at risk. Defensics (BMP, GIF, JPEG, MBM, PCX, PNG, PIX, PNM, RAS, TIFF, WBMP,
XBM, XPM, WMF), Video (AVI, QuickTime, MPEG1, MPEG2, MPEG4,
is a next-generation security-testing platform that enables developers and users of MOV), Archives (ZIP, CAB, JAR, LHA, GZIP), vCalendar, vCard,
MPEG2-TS, NFS Media, UPnP
technology to rapidly, reliably, and efficiently find and correct dangerous errors and
Email: POP3, IMAP4, SMTP, MIME
flaws. By proactively bringing the unknown into total view, Defensics sets the bar for
File Systems / Storage: CIFS/SMB Server, iSCSI Server, SunRPC
superior vulnerability management. Server, SMBv2, NFSv2, NFSv3, NFSv4

WiFi: AP Test Suite, AP WPA Test Suite, Client Test Suite, Client WPA
The technology at the core of Defensics is fuzz testing. This is an automated Test Suite

methodology that tests for unknown vulnerabilities by systematically sending invalid or Link Management: LACP, STP, MSTP, RSTP, ESTP

Bluetooth: L2CAP, SDP, RFCOMM, OBEX, OPP, FTP, IrMC Synch,


unexpected inputs to the system under test. Fuzz testing exposes software defects BIP, BPP, BNEP, HFP, HSP, DUN, PBAP, FAX, AVRCP, A2DP, HCRP,
and vulnerabilities more effectively than any other solution in the market. HID, SAP, MDP

IPTV: MPEG4, MPEG2, IPsec, TLS/SSL, TLS 1.2, RTP/RTCP,


RTSP, HTTP, FTP, TFTP, IPv4, IPv6, PIM-SM/DM, RSVP, IGMP,
Defensics was used to CWMP(TR-69) ACS, CWMP(TR-69) CPE
identify the OpenSSL PDA/Smartphone: IPv4, IPv6, DHCP/BOOTP, HTTP, TLS/SSL, TLS
1.2, UPnP, SIP, Audio, Images, Video, Bluetooth, 802.11, SMS/PDU,
Heartbleed vulnerability SMS/SMPP
in April 2014 (Google Industrial Automation: (SCADA/DCS) Modbus, IPv4 (TCP, UDP, IPv4,
ICMP, IGMP, ARP), IPv6 (TCP, UDP, IPv6, ICMPv6), Profinet, DNP3,
independently reported
IEC-61850/MMS, GOOSE-SV, IEC-104, TCF, OPC UA, CoAP, BACnet,
the vulnerability at CIP/EtherNet/IP

the same time). A Metro Ethernet: BFD, CFM, E-LMI, Ethernet, GARP, LLDP, OAM,
PBT/PBB-TE, L2TP
security researcher at General Purpose: XML SOAP, Traffic Capture Fuzzer, Universal
Codenomicon (now Fuzzer

Finance: FIX
Synopsys) had been
Web Applications: FIX, JSON, OAuth, SOCKS Client, SOCKS Server,
running a routine test of the Defensics feature, SafeGuard, when he identified a flaw in Traffic Capture Fuzzer, Universal Fuzzer, Web Applications Fuzzer,
Web Sockets, XML file format, XML SOAP Server, XML SOAP Client
OpenSSL. It had gone unidentified for over two years. Ultimately Heartbleed impacted
Web: HTTP, XML, Web Applications, Digital Media, Universal Fuzzer
over 500,000 websites.
Automotive: Bluetooth, WiFi, Digital Media, SMS, General purpose
fuzzers

Synopsys Inc. U.S. Sales: (800) 873-8193


www.synopsys.com/software 185 Berry Street, Suite 6500 International Sales: +1 (415) 321-5237
San Francisco, CA 94107 USA Email: [email protected]

© 2016 Synopsys, Inc. All rights reserved. The registered trademarks of Synopsys used herein are registered in the U.S. and other countries. All other
company and product names are the property of their respective owners.

You might also like