beSTORM in Use

Below are several tutorials that exemplify just a few of the practical testing applications of beSTORM. These step-by-step guides illustrate how simple and effortless vulnerability testing with beSTORM can be. If the testing of network hardware, protocols, or black-box software programs is a security necessity for you or your organization, please take a moment to examine these guides. The contents of this page are only a few examples of beSTORMs application.

Smart Fuzzing: Testing a PDF Application

  • beSTORM, in addition to network and protocol testing, can also fuzz test file formats into their accepted applications.
  • In this example, beSTORM will generate malformed PDF files which will then be tested in Adobe Acrobat via batch file.

Testing Hardware Firewalls with beSTORM

  • Allows testing of IPv4 and IPv6 through Direct or Pass-Through testing modes.
  • Also supports a variety of protocols: ARP, TCP, ICMP, UDP, HTTP and DHCP.

Testing HTTP with beSTORM

  • Test with or without administrative access to HTTP server.

Testing SSL/HTTPS servers with beSTORM

  • Test with or without administrative access to SSL/HTTPS server.

Testing IPSEC with beSTORM

  • Test with or without administrative access to IPSEC server

Testing SSH with beSTORM

  • Test with or without administrative access to SSH server.

Testing ICMP with beSTORM

  • Test with or without administrative access to IMCP server.

Testing DLL / API with beSTORM

  • Test with or without administrative access to dll server.