Risk
2/26/2013
10:38 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Stonesoft Releases Evader 2.01 Advanced Evasion Testing Tool

Free security software identifies weaknesses in company networks against advanced evasion techniques

SAN FRANCISCO--(BUSINESS WIRE)--Stonesoft today released Evader 2.01 an updated version of the world´s first advanced evasion software testing tool. Since its initial release at Black Hat in July, thousands of companies have downloaded the tool to identify potential security risks in their network.

Evader 2.01 provides organizations with a free tool that can be used to test their network's ability to withstand advanced evasion techniques (AETs). Evader 2.01 includes a new graphical user interface to improve usability and the tool supports multiple evasion techniques and can be used in any test environment.

AETs are used to attack networks by combining several known evasion methodologies to create a new, earlier unknown and dynamically changing technique that is delivered over several layers of a network simultaneously. This allows the attacker to successfully deliver any exploit, malicious payload or code to a target host without detection.

"Breaches continue to occur where corporations have invested heavily in security solutions. However, design flaws in existing firewalls and intrusting prevention systems are being exploited" said Ilkka Hiidenheimo, CEO of Stonesoft. "Attackers are more sophisticated today and employ evasive techniques to avoid detection. Organizations must be aware of these types of attacks and Evader can be used to help them find out whether they can resist the attacks."

Evader 2.01 is a ready-made test lab that includes a set of AETs. It enables an organization to run manually or automatically a variety of AET combinations that hide well-known MSRPC (vulnerability from 2008) and HTTP (2004) exploits, and then deliver them through the tested network security devices to a vulnerable target host image. Evader 2.01 includes a set of AETs that has gone through the CERT vulnerability coordination process, which began two years ago. The essence of Evader is to provide hard facts about AET readiness of an organization's own security devices, support decision making and raise an organization's security level.

Stonesoft is demonstrating Evader 2.01 in San Francisco during the annual RSA Conference at booth #1953, February 25 to March 1, 2013. During the demonstration, Stonesoft will test leading security products for their ability to protect against AETs, including HP/Tipping Point, McAfee, Palo Alto Networks and SourceFire.

To download Evader for free and learn more about the tool, please visit evader.stonesoft.com. For more information about advanced evasion techniques and Stonesoft's new Evasion Prevention System (EPS) please visit aet.stonesoft.com.

About Stonesoft

Stonesoft Corporation (NASDAQ OMX: SFT1V) delivers dynamic, software-based network security solutions that secure information flow for more than 6500 mid- and large-sized organizations across the globe. These include the industry's first transformable Security Engine as well as standalone next generation firewalls, intrusion prevention systems and SSL VPN solutions. At the core of these solutions is the Stonesoft Management Center, which unifies and simplifies the management of entire networks while reducing TCO. Stonesoft is a recognized researcher of advanced evasion techniques and has the highest customer retention rate in the industry. Founded in 1990, the company's corporate headquarters are based in Helsinki, Finland with North American headquarters in Atlanta, Georgia. For more information, please visit www.stonesoft.com or stoneblog.stonesoft.com. Follow Stonesoft at twitter.com/Stonesoft_US.

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.x5KyYPIe.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.