Wubi Posted July 24, 2012 Report Posted July 24, 2012 July 24, 2012 By Black Evader can be used to test your organization’s network security devices against Advanced Evasion Techniques that are increasingly used in sophisticated and targeted cyber attacksEvader launches a set of AETs against a tester’s own next generation firewall (NGFW), Intrusion Prevention System (IPS) and Unified Threat Management (UTM). As a result, organizations can understand whether these AETs pose a threat to their own networks and digital assets.Features of EvaderLaunch controlled AET-borne attacks at your own defense technologyTweak evasions and combinations, and instantly see if you are successfulThe Evader includes a set of AETs that has gone through the CERT vulnerability coordination process that began two years ago. The purpose of Evader is to provide hard facts about AET readiness of an organization’s own security devices, support decision-making and raise an organization’s security level.Advanced Evasion Techniques (AET)Discovered and reported by Stonesoft since 2007Stealth cyber attack methods that bypass network securitySimultaneous execution on multiple protocol layersCapable of changing dynamically during an attackEvasion combinations and modificationsNot satisfactorily tested in published security device lab testsDespite most security vendors promising 100 percent protection against evasion attacks, hackers are still breaching some of the world’s most secure networks using more advanced methods like AETs.AETs are used to attack networks by combining several known evasion methodologies to create a new, previously unknown and dynamically changing technique that is delivered over several layers of a network simultaneously. This allows the attacker to successfully deliver any exploit, malicious payload or code to a target host without detection.Download Evader:Evader – EvaderSursa: PenTestIT — Your source for Information Security Related information! Quote