Search

Idappcom Ltd - News Release - 12th July 2017

For Immediate Release

For Immediate Release

Idappcom's Latest Batch of Exploit Traffic Files includes Attacks Against Major Security Vendor Vulnerabilities

12th July 2017, Ludlow, UK - Idappcom's research team have released the latest batch of 176 application exploit pcaps that includes vulnerabilities affecting major threat detection solutions from Trend Micro and D-Link's range of Wifi and DSL routers that are widely deployed in many small business networks. Used by many of the security industry's leading vendors and pentest consultants, Idappcom's pcap library provides the real-world exploit traffic files needed to assess the effectiveness of their next generation firewalls, IDS/IPS and UTM devices in recognising and blocking the latest threats.

Idappcom's security experts use a range of tools and resources to capture exploits in circulation designed to attack application and hardware vulnerabilities, which can allow security breaches such as malware injection or access to confidential areas of the target networks. Typically, the team adds between 150 and 200 new pcaps each month to its traffic file library, which now totals more than 14,000 exploits.

Amongst the traffic files affecting Trend Micro's Threat Discovery Appliance 2.6 in this month's list, CVE-2016-8586 is a vulnerability classified by Trend as very critical with a potential impact on confidentiality, integrity, and availability. The D-Link exploit packet captures includes an authentication by-pass vulnerability that allows access to the DIR-600M Wireless router admin panel just by inserting blank spaces into the password field. The exploitation of authentication weaknesses has been linked to the growth in attacks on routers to specifically access IOT and Scada devices. Such attacks have been used to create massive botnets based on captured Webcams and smart devices, including the 2016 Mirai DYN attack that knocked out large sections of the US Internet.

Simon Wesseldine, Idappcom's Security Team lead commented "Our pcaps are the actual exploit files written to target these and the hundreds of new vulnerabilities that are discovered every month. These enable security managers to test the integrity of their security infrastructure as soon as they appear in the wild. We strongly recommend that businesses should regularly test the effectiveness of their network security appliances as often as possible using tools and the exploit pcaps' that enable simulated attacks to take place. That way they can accurately reproduce how a hacker would operate and ensure their defences are fully updated."

All the traffic files released by Idappcom have updated security policies available to download that can be rapidly deployed using a unique centralised rule-management tool (Easy Rules Manager) to block exploits using the vulnerabilities to breach network security systems.

Idappcom's traffic files are available on subscription and can be downloaded from the company's Web site along with the associated rule updates and specialist tools needed to ensure that all Snort-based security devices are operating with maximum effectiveness.

The full list of the latest Traffic Files can be viewed at http://www.idappcom.com/news/updates/2017/news30-06-17.php

 

For more information contact Stephen Meredith, PR Manager on 0203 355 6804 or email stephen.meredith@idappcom.com or go to our contact page.

About Idappcom

www.idappcom.com www.go-ipsy.com

Idappcom is a privately owned cyber security software and services business focussed on the development of firewall and IDS/IPS assessment and Snort Rule management tools. Established in 2004 the company provides products and ancillary services to a worldwide user base including many of the leading security vendors and large enterprises. Idappcom also provides a managed cyber protection platform used by operators and MSSPs to deliver enterprise-class IPS services to SMEs and Home internet users.


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.