Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    App Finds Fault With Net Security

    Written by

    John Taschek
    Published May 20, 2002
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Even the best scanners cant predict the future. In fact, given the numerous incidents of new attacks and worm and virus outbreaks, it appears that vulnerability scanners make lousy prognosticators. Cenzic Inc.s Hailstorm 3.0 takes a completely different—though often complementary—approach.

      IT administrators and security specialists can use Hailstorm, which shipped early this month and costs $30,000 per unit (single machine), to inject faults into any part of the network unto find vulnerabilities before crackers can. Fault injections via Hailstorm make it possible to stress any part of a system—including Web servers, network devices and firewalls—find the vulnerabilities in those systems and discover how those flaws affect the rest of the network.

      Hailstorm brings fault injection to the general IT market for the first time, but the concept is not new. It has been used in the airline industry for years. For example, jet manufacturers need to know not only how to stress and break individual components of jet engines but also what else will be affected during the process.

      The software industry has adopted this concept in the application development area, but it is typically categorized as software quality assurance or as a generic life-cycle management capability. Fault injection in the security world has been discussed before, but, mainly, it has been stuck in research.

      Knowing What You Dont Know

      Traditional vulnerability scanners, including the ones evaluated throughout this package, access a database of previously documented vulnerabilities. They then profile the packets and generate similar traffic patterns to check for holes in whatever systems are being tested.

      The vendors of these products are also responsible for keeping their databases up-to-date. Since most vulnerabilities are already registered, these tools do an excellent job at securing more than 95 percent of the flaws that could lead to a system compromise.

      However, vulnerability scanning tools are ineffective at discovering flaws that have not been reported. Suffice it to say, the total number of documented flaws at any given moment pales in comparison with the entire set of flaws that have not been discovered.

      The goal of Hailstorm is to help security professionals and developers tighten security to prevent unauthorized users from taking advantage of undiscovered flaws.

      Because of its design, Hailstorm may miss some of the thousands of previously reported vulnerabilities. Therefore, companies highly concerned about security should consider Hailstorm complementary to tools such as Foundstone Inc.s FoundScan.

      All security assessment tools can be used as weapons in the wrong hands, so Cenzic has a fairly strict registration policy. eWeek Labs had to register the product to use it, and during the registration process, we had to list the IP ranges that we would be testing against.

      In addition, Hailstorm must be connected to a network to function, a safeguard that might cause some welcome annoyances down the road.

      Hailstorm presented us with a list of four generic tests: Web application, network device, intrusion detection system signature and firewall.

      These tests categorize the types of traffic that Hailstorm can generate. For example, the firewall test includes ICMP, or Internet Control Message Protocol; TCP; and UDP, or User Datagram Protocol, traffic, while the network device test stresses equipment that maintains static TCP state tables.

      Its important to note that this is just a starting point. Hailstorm includes facilities for generating any kind of traffic against any kind of device.

      Because Hailstorm is flexible, its inherently more difficult to use than traditional vulnerability scanners. It can be far more powerful, however. In tests, we could run SQL Parser scripts against a database, inject commands into any Unix device or run buffer overflows into any networked system.

      We could also schedule these transactions to happen at any time. More important, we could capture our own traffic and use Hailstorm to profile it.

      The traffic profiling capability, meanwhile, allowed us to run Hailstorm as a load testing system, similar to NetIQ Corp.s Chariot or Caw Networks Inc.s WebAvalanche.

      However, because Hailstorm runs solely on the Windows platform using Microsoft Corp.s embedded database engine, it cannot generate the same kind of loads that Chariot or WebAvalanche can and is not a direct competitor.

      John Taschek
      John Taschek
      As the director of eWEEK Labs, John manages a staff that tests and analyzes a wide range of corporate technology products. He has been instrumental in expanding eWEEK Labs' analyses into actual user environments, and has continually engineered the Labs for accurate portrayal of true enterprise infrastructures. John also writes eWEEK's 'Wide Angle' column, which challenges readers interested in enterprise products and strategies to reconsider old assumptions and think about existing IT problems in new ways. Prior to his tenure at eWEEK, which started in 1994, Taschek headed up the performance testing lab at PC/Computing magazine (now called Smart Business). Taschek got his start in IT in Washington D.C., holding various technical positions at the National Alliance of Business and the Department of Housing and Urban Development. There, he and his colleagues assisted the government office with integrating the Windows desktop operating system with HUD's legacy mainframe and mid-range servers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×