"The Codenomicon tools are amazing. Using them is like being attacked by the most relentless adversary who uses every possible method to find flaws in your code

We fixed subtle crash bugs in Samba that had been in the code for over ten years. We would never have found those bugs without the Codenomicon tools.

If you're serious about implementing protocols correctly, you need the Codenomicon tools."

-- Jeremy Allison,
   Co Creator of Samba


  • DEFENSICS™
  • » Features/Benefits
  • » DEFENSICS™ for XML
  • » Traffic Capture Fuzzer
  • » Universal Fuzzer
  • » Test Suite Packages
  • » By Protocol
  • Fuzz-o-Matic™
  • Situation Awareness
  • » Network Analyzer
  • » Abuse Situation Awareness
  • » Virtual Situation Room
  • » Logster
  • Buzz on Fuzzing
  • » Technology Advantage
  • » Metrics and Coverage

Defensics™   spacer

Overview | History | Features in Detail | Screenshots


Proactive security and robustness testing

spacer

Introducing NEW Defensics X:
10 times the power, 10 times the efficiency!

If you already are a Defensics user, log in to the arena to download Defensics X.


Codenomicon Defensics continues to lead the space in unknown vulnerability management. The new Defensics 10 test platform enhances Codenomicon's fuzzing capabilities to provide the highest quality preemptive security testing for network equipment manufacturers, operators, consumer electronics companies, enterprises and governmental organizations. Companies rely on Codenomicon's Defensics solutions to mitigate threats to their business reputation and sales.

Based on the security test automation technique called fuzzing, Defensics systematically sends invalid or unexpected inputs to the system under test exposing software defects and vulnerabilities more effectively than any other solution in the market.

With Codenomicon Defensics you can proactively discover exploitable zero day (0-day) vulnerabilities. With the rise of state sponsored hacking and unprecedented levels of hacktivism it has become ever more important to manage your threat exposure using advanced technologies, like those we offer here at Codenomicon.

Defensics X Feature Highlights

  • Extensive Protocol Coverage

    Defensics generational (model based) fuzz testing modules are available in over 200 standard network protocols. These tests can be further enhanced with Defensics Universal and Traffic Capture fuzzing modules, with which you can now fuzz any network protocol, service interface or application file format.

    Defensics 10 introduces completely new test capabilities for Bluetooth and for SIGTRAN Networks. This results in unlimited protocols and file formats covered by Defensics giving you unprecedented opportunities to harden your systems.

  • Fully model-based fuzzers

    Defensics test suites are based on deep protocol models. Test cases are created automatically, no need for manual test case creation! Model-based fuzzers emulate a protocol or file format interface, allowing them to understand the inner workings of the tested interface. For this reason, tests are able to penetrate much deeper within the system under test, reaching all the way into the state machine and even output generation routines.

  • Intuitive and extensible

    Easy to use test solution gets you up-to-speed quickly. Clear and logical user interface will guide you through every step of the testing process. A command-line interface that supports third party tools and scripts is also available.

  • Fast, automated test runs

    The faster you can execute tests, the more tests you can run and more vulnerabilities you will find. Defensics can generate and run thousands of test cases per second! Read more about Fuzzing performance.

  • Accurate, actionable reports

    Defensics provides accurate reports that are easy to interpret and act upon. The reports have direct links to test cases identifying specific problems, which helps sharing detailed test results within your organization. Identified flaws are absolutely repeatable and traceable. The immediate failure reproduction facilitates prompt reaction and fix verification.

Read more about Defensics > features in detail

Usage scenarios

Defensics testing solutions are used by leading software manufacturers, operators, service providers and government labs to secure critical networks and to provide robust and reliable products and services.

Learn more about Defensics usage by different audiences:

  • for software developers and testers
  • for penetration testing
  • for telecommunications
  • for enterprises

Unknown vulnerability management

Since the access into the system or device is enabled by a vulnerability in the code, the number one security priority should be finding and fixing vulnerabilities in both in-house and third-party developed code. Vulnerability management is often understood as scanning for known vulnerabilities, but finding the unknown vulnerabilities is equally important.

Learn more about Codenomicon Unknown Vulnerability Management.

Fuzzing

Fuzzing or fuzz testing is a negative software testing method that feeds a program, device or system with malformed and unexpected input data in order to find defects. Software testers, developers and auditors can quickly and cost-effectively find defects that can be triggered by malformed inputs via external interfaces.

More information on fuzzing.

Contact us for more information

First Name:

Last Name:

E-Mail:

Country:

Which product/service are you
interested in?

reCAPTCHA:

spacer


spacer


spacer


spacer


spacer


spacer


spacer spacer spacer


 
 
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.