author photo
By SecureWorld News Team
Fri | Dec 8, 2017 | 4:03 AM PST

Whether someone on your team needs to do a "quick" application vulnerability analysis, or you are a security researcher that makes your living doing this type of work, here are two open source tools that might help.

Both of these have been released by Cisco Talos as open source efforts, and their own researchers have found them very helpful. Just be aware that they do not come with support.

Mutiny Fuzzing Framework

"The Mutiny Fuzzing Framework is a network fuzzer that operates by replaying network traffic through a mutational fuzzer. The goal is to begin network fuzzing as quickly as possible, at the expense of being thorough."

Download Mutiny Fuzzing Framework:
https://github.com/Cisco-Talos/mutiny-fuzzer

Decept Proxy

Decept Proxy is a multi-purpose network proxy, with a nice combination of capabilities: 

  • It supports TLS endpoints, IPv6, Unix Sockets, abstract namespace sockets, L3 protocols/captures, and L2 bridging and passive modes.
  • It can perform SSH proxying/sniffing/filtering.
  • It was created with portability in mind and only uses standard python libraries. As long as the system you're going to run Decept Proxy on has Python 2 install, it should be good to go.

The Decept Proxy can be found on GitHub here:
https://github.com/Cisco-Talos/Decept

Says Cisco AIG researcher James Spadaro, "The Mutiny Fuzzing Framework and Decept Proxy have been an effective toolset for Cisco in evaluating a variety of network applications and devices. This includes a number of Cisco devices which have been hardened based on bugs and vulnerabilities that were identified by network fuzzing."

On top of this success, the price is right!

Comments