Dynamic, Black Box Testing on the Label Distribution Protocol (LDP)

BeSTORM is the most efficient, enterprise ready and automated dynamic testing tool for testing the security of any application or product that uses the Label Distribution Protocol (LDP)

What is LDP Protocol?

Label Distribution Protocol (LDP) is a protocol in which routers capable of Multiprotocol Label Switching (MPLS) exchange label mapping information. Two routers with an established session are called LDP peers and the exchange of information is bi-directional. LDP is used to build and maintain LSP databases that are used to forward traffic through MPLS networks.

What are LDP Use Cases?

LDP can be used to distribute the inner label (VC/VPN/service label) and outer label (path label) in MPLS. For inner label distribution, targeted LDP (tLDP) is used. LDP and tLDP discovery runs on UDP port 646 and the session is built on TCP port 646. During the discovery phase hello packets are sent on UDP port 646 to the ‘all routers on this subnet’ group multicast address ( However, tLDP unicasts the hello packets to the targeted neighbor’s address.

BeSTORM Benefits

BeSTORM specializes in testing the reliability of any hardware or software that uses this transport protocol as well as ensuring the function and security of its implementation.

By intelligently testing up to billions of combinations of dynamically generated input, beSTORM ensures the security and reliability of your products prior to deployment. It is also used around the world by government and industry certification centers to ensure that products are secure before purchase and deployment.

Unlike static testing tools, beSTORM does not require source code and can therefore be used to test extremely complicated products with a large code base. In comparison static source code testing tools must have access to the source code and testing very large code bases can be problematic. beSTORM also reduces the number of false positives by reporting only actual successful attacks.

BeSTORM uses an approach known as Smart Fuzzing, which prioritizes the use of attacks that would likely yield the highest probably of product failure. These methods of testing are unique compared to older generation tools that use a fixed number of attack signatures to locate known vulnerabilities in products.

In addition, beSTORM can also be used to test proprietary protocols and specifications (textual or binary) via its Auto Learn feature. This results in a full featured, versatile, and efficient tool that can help your QA team ensure the reliability and security of your software development project.

Get a black box fuzzer demo to see how fuzzing
can help your organization’s cybersecurity