By combining a built-in set of known vulnerabilities with a fuzzing engine capable of discovering unknown bugs by exploring the boundaries of protocols, the Mu-4000 appliance seeks to ensure that applications and devices are secure and robust.
While there's no substitute for source-code analysis tools and good application-development practices, fuzzing is an increasingly popular way to perform additional validation. And in environments where an existing embedded stack or platform is being used in a product, fuzzing or other black-box testing might be the only security analysis possible. BreakingPoint Systems also offers an appliance, and there are multiple commercial and open-source software-based fuzzers as well.
Mu provides an easy-to-use interface for creating even complex testing situations quickly. While the cost can be steep depending on protocol sets purchased, potentially discovering vulnerabilities before deploying an application could be priceless.
Deploying flawed software is expensive, and as more formerly internal-facing applications gain shiny new Web front ends, the need for secure coding practices is increasing. So how can you safely poke and prod your apps to see if they'll break -- or worse, open doors for attackers?
The most extensive -- and expensive -- computational attack tool: the mind of a human penetration tester or application security guru. On the development side, source-code analysis tools provide value. But if you have access to the app only once it's deployed or compiled, black-box testers, like static vulnerability scanning tools and fuzzers, are your best bet.
Fuzzers attempt to explore the boundaries of file formats, protocols, or interfaces. With dual uses in both quality assurance and security, fuzzers can make applications more robust. By combining intelligent templates of what protocols look like and modifying all mutable fields -- and sometimes even supposedly immutable ones -- fuzzers are especially good at crashing applications and devices, and they'll sometimes find exploitable conditions; for more on fuzzing see a primer here.