Connect with us

Hi, what are you looking for?


Network Security

Stonesoft Pen Testing Tool Uses Advanced Evasion Techniques, Firm Says

Stonesoft released a new, free tool today to help organizations test their network security.

Stonesoft released a new, free tool today to help organizations test their network security.

Dubbed Evader, the tool launches a set of attacks that use what the company refers to as “advanced evasion techniques” (AET) against a tester’s own next generation firewall (NGFW), Intrusion Prevention System (IPS) and Unified Threat Management (UTM). The tool enables organizations to run a variety of AEs that hide well-known Microsoft Remote Procedure Call (MSRPC) and HTTP exploits and deliver them through network security devices to a vulnerable target host image.

Evader Pentesting ToolEvader includes a set of AETs that have gone through the CERT vulnerability coordination process that began two years ago, and is designed to analyze whether an organization is ready to deal with advanced evasion techniques targeting their own devices, according to the company. Among the evasions supported by the product are: IPv4 fragmentation, HTTP URL encoding and MSRPC request segmentation. 

“Network security solution vendors have not taken AETs seriously enough, and organizations are paying the price through data breaches that put companies, federal agencies and customers at risk,” said Ilkka Hiidenheimo, founder and CEO of Stonesoft, in a statement. “Customers and the whole security community have been asking us to provide deeper knowledge about AETs and demanding products that test for them…By providing the tool for free, we’re giving organizations the same level of knowledge that today’s sophisticated hackers have and the ability to test their own environments for this risk.”

Stonesoft is demonstrating Evader this week during the Black Hat security conference in Las Vegas, which ends July 26.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...