Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

7/30/2007
12:25 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

BreakingPoint Offers Same-Day 0-Days

Startup to announce general availability of its new BPS-1000 testing tool, controversial vulnerability disclosure policy

BreakingPoint Systems, the startup with renowned white-hat hacker HD Moore as its director of security research, tomorrow will announce that it's now shipping its all-in-one network and security testing appliance.

And the company says the same day it alerts a vendor of any new bug discovered by its security team, customers of BreakingPoint's new BPS-1000 will receive a corresponding exploit attack module for the testing tool. (See Startup Launches Breakout Testing Tool and 10 Hot Security Startups.)

"We don't wait for the vendor to patch," says Dennis Cox, BreakingPoint's CTO. "We don't release it to the public, but to our customers."

The only exception, Cox says, would be when Austin, Tex.-based BreakingPoint finds a bug in one of its (vendor) customers' products. "If we find a vulnerability in their product, we notify them and ask them when they want us to release it," he says. But any vendors that aren't BPS-1000 customers are fair game. And BPS-1000 customers, whether they are enterprises or vendors, as part of their product subscription must agree not to disclose these newly discovered bugs they get, he says.

Cox says the networking vendor community's reaction to BreakingPoint's disclosure policy has ranged from "you rock" -- because it gives them an inside track on say, a Microsoft bug -- to annoyed, because it would mean working after-hours and on weekends to fix a new bug in their products.

The BPS-1000, which researcher Moore says was inspired by his work on the Metasploit hacking tool, doesn't actually exploit a system -- it runs attacks, called Strike Packs, through the attached networking or security device. "The vulnerabilities don't come in source code. They are live packs," Cox says. "You're not getting how to do [exploit] it -- you're just running it in the product."

Cox says BreakingPoint has more than 3,000 Strike Pack attack modules, which come with a subscription service for the product that keeps customers up-to-date with the latest exploits and protocol analyzers. So far, BreakingPoint's main customers are networking equipment vendors, including Juniper Networks, which has five BPS-1000 boxes, Cox says. Juniper's security group that builds the company's IPS systems runs it, and so does its technology marketing organization, which uses it to benchmark performance of its products for marketing purposes.

"Instead of waiting for Patch Tuesday, [for example], Juniper [and other customers] get access to the latest zero-days before Microsoft gets them" patched, Cox says. And the point-and-click interface with the tool makes it accessible for less technical users as well, he adds.

Cox notes that one IPS vendor customer is using the BPS-1000 to determine how its device handles attacks at different speeds.

The BPS-1000, meanwhile, does performance, stress, security, and conformance testing of networking and security products and comes with several application-layer fuzzing tools, including ones for HTTP, FTP, DNS, SMTP, DHCP, NFS, SNMP AOL instant messaging, LDAP, and others. The appliance is list-priced at $185,000.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • BreakingPoint Systems
  • Juniper Networks Inc. (Nasdaq: JNPR)
  • Microsoft Corp. (Nasdaq: MSFT)

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    How to Think Like a Hacker
    Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
    7 SMB Security Tips That Will Keep Your Company Safe
    Steve Zurier, Contributing Writer,  10/11/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-13116
    PUBLISHED: 2019-10-16
    The MuleSoft Mule runtime engine before 3.8 allows remote attackers to execute arbitrary code because of Java Deserialization, related to Apache Commons Collections.
    CVE-2019-17664
    PUBLISHED: 2019-10-16
    NSA Ghidra through 9.0.4 uses a potentially untrusted search path. When executing Ghidra from a given path, the Java process working directory is set to this path. Then, when launching the Python interpreter via the "Ghidra Codebrowser > Window > Python" option, Ghidra will try to ex...
    CVE-2019-17665
    PUBLISHED: 2019-10-16
    NSA Ghidra before 9.0.2 is vulnerable to DLL hijacking because it loads jansi.dll from the current working directory.
    CVE-2019-17435
    PUBLISHED: 2019-10-16
    A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation.
    CVE-2019-17436
    PUBLISHED: 2019-10-16
    A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system.