Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Dave Aitel (dave_at_immunitysec.com)
Date: Tue Feb 04 2003 - 15:48:26 CST
Immunity, Inc. is proud to announce both a new paper on SPIKE and
related fuzzing technology, and the release of SPIKE 2.8. Both are
available from http://www.immunitysec.com/spike.html . SPIKE is a
full-featured network protocol analysis toolkit, written in C, and
released under the GNU Public License (GPL).
The most obvious change to SPIKE 2.8 is the inclusion of a DCE-RPC over
named pipe fuzzer.
The abstract of the paper is below. It should be noted that the paper
contains not only detailed information on how to detect the RPC Locator
vulnerability with SPIKE, but also several other vulnerabilities in
Windows 2000 that were discovered as part of this testing. (For a binary
of one of them, try http://www.immunitysec.com/downloads/plonk ).
The Advantages of Block-Based Protocol Analysis for Security Testing
Abstract. This paper describes an effective method for black-box testing
of unknown or arbitrarily complex network protocols for common problems
relating to the security of a program or system. By introducing a
block-based method for taking advantage of all known factors in a
network protocol, and delimiting the effect of all unknown factors, the
potential space of inputs to a program can be reduced intelligently by a
tester, compensating for incomplete knowledge of the target's
implementation or design.
Public and Media Relations