Risk
2/26/2013
10:38 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Stonesoft Releases Evader 2.01 Advanced Evasion Testing Tool

Free security software identifies weaknesses in company networks against advanced evasion techniques

SAN FRANCISCO--(BUSINESS WIRE)--Stonesoft today released Evader 2.01 an updated version of the world´s first advanced evasion software testing tool. Since its initial release at Black Hat in July, thousands of companies have downloaded the tool to identify potential security risks in their network.

Evader 2.01 provides organizations with a free tool that can be used to test their network's ability to withstand advanced evasion techniques (AETs). Evader 2.01 includes a new graphical user interface to improve usability and the tool supports multiple evasion techniques and can be used in any test environment.

AETs are used to attack networks by combining several known evasion methodologies to create a new, earlier unknown and dynamically changing technique that is delivered over several layers of a network simultaneously. This allows the attacker to successfully deliver any exploit, malicious payload or code to a target host without detection.

"Breaches continue to occur where corporations have invested heavily in security solutions. However, design flaws in existing firewalls and intrusting prevention systems are being exploited" said Ilkka Hiidenheimo, CEO of Stonesoft. "Attackers are more sophisticated today and employ evasive techniques to avoid detection. Organizations must be aware of these types of attacks and Evader can be used to help them find out whether they can resist the attacks."

Evader 2.01 is a ready-made test lab that includes a set of AETs. It enables an organization to run manually or automatically a variety of AET combinations that hide well-known MSRPC (vulnerability from 2008) and HTTP (2004) exploits, and then deliver them through the tested network security devices to a vulnerable target host image. Evader 2.01 includes a set of AETs that has gone through the CERT vulnerability coordination process, which began two years ago. The essence of Evader is to provide hard facts about AET readiness of an organization's own security devices, support decision making and raise an organization's security level.

Stonesoft is demonstrating Evader 2.01 in San Francisco during the annual RSA Conference at booth #1953, February 25 to March 1, 2013. During the demonstration, Stonesoft will test leading security products for their ability to protect against AETs, including HP/Tipping Point, McAfee, Palo Alto Networks and SourceFire.

To download Evader for free and learn more about the tool, please visit evader.stonesoft.com. For more information about advanced evasion techniques and Stonesoft's new Evasion Prevention System (EPS) please visit aet.stonesoft.com.

About Stonesoft

Stonesoft Corporation (NASDAQ OMX: SFT1V) delivers dynamic, software-based network security solutions that secure information flow for more than 6500 mid- and large-sized organizations across the globe. These include the industry's first transformable Security Engine as well as standalone next generation firewalls, intrusion prevention systems and SSL VPN solutions. At the core of these solutions is the Stonesoft Management Center, which unifies and simplifies the management of entire networks while reducing TCO. Stonesoft is a recognized researcher of advanced evasion techniques and has the highest customer retention rate in the industry. Founded in 1990, the company's corporate headquarters are based in Helsinki, Finland with North American headquarters in Atlanta, Georgia. For more information, please visit www.stonesoft.com or stoneblog.stonesoft.com. Follow Stonesoft at twitter.com/Stonesoft_US.

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.x5KyYPIe.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2012-0871
Published: 2014-04-18
The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.

CVE-2012-6646
Published: 2014-04-18
F-Secure Anti-Virus, Safe Anywhere, and PSB Workstation Security before 11500 for Mac OS X allows local users to disable the Mac OS X firewall via unspecified vectors.

CVE-2013-4279
Published: 2014-04-18
imapsync 1.564 and earlier performs a release check by default, which sends sensitive information (imapsync, operating system, and Perl version) to the developer's site.

Best of the Web