Mu-4000 fuzzer shines with wizard-driven test configuration, intelligent workflow, excellent vulnerability profiling, and auto-generated zero-day exploits
I first came across the Mu Security Analyzer when a coworker on a multicompany government project raved about how the appliance found a zero-day vulnerability in an e-mail inspection device that was protecting a top-secret government agency. It was a rather simple script bug in the other vendor’s product, but it would have allowed uncontrolled code execution. The implication was that our top-secret project could have been compromised by an external hacker running penetration tests against our e-mail services. Initially, the manufacturer of the compromised mail filter refused to believe that a weakness existed in its product. That is, until we sent the exploit, automatically generated by the Mu analyzer, that the vendor's engineers could run to see for themselves.
[See slideshow: Mu-4000 Security Analyzer: A Guided Tour ]
Mu Security’s Mu-4000 is a 2U appliance with RAID-configured drives and redundant power supplies that scans other computer devices using known vulnerabilities and malformed (fuzzed) traffic. The goal is to locate both security vulnerabilities and performance problems in the network. The Mu-4000 is constantly updated with the latest published vulnerabilities, but these types of exploits are not the Mu-4000’s strong point. Published Vulnerability Attacks (or PVAs, as Mu Security calls them) only go back a maximum of three years and comprise slightly more than 1,000 exploits.
The Mu’s ability to intelligently fuzz traffic is its strongest selling point. Unlike vulnerability scanners or penetration tools that check only for known vulnerabilities, fuzzing can uncover previously unknown vulnerabilities by hitting network devices with mutations of normal packets and commands. The Mu-4000 understands more than 50 different protocols (IPv4, IPv6, VoIP, SIP, CIFS, ICMP, and SSH, among others) and can generate malformed traffic in millions of ways. The Mu-4000 includes the capability to automatically restart hung hosts and capture packet traces (in pcap form) of both sent and received traffic. The Mu can also capture what is going on in the target device’s network interface or management port, and fire off scripts or kick-start other monitoring devices when a particular event happens.
I ran the Mu-4000 with its 3.0 release code in a test lab against several popular security appliances and a variety of different computer platforms. The Mu-4000 configures like most any security appliance. You plug a computer into its front console port, connect to the Mu’s SSL management port, and configure basic IP information. After that, you can connect using an Internet browser, configure the rest of the device, and start your testing.
The Mu-4000 runs on a modified version of CentOS (essentially Red Hat Linux), modified so that its IP stack will not choke on all the malformed traffic it will be sending. When the device is first started, you must install a license file that specifies which protocols may be attacked. Access to the Mu-4000 can be divided between system admins, who have complete control of the device, and regular users, who can see only results from scans that they create and run. The Mu-4000 has four IP interfaces that can be used in target analysis, and the device can create the attacks or be used as a pass-through device to record information you're gathering with another tool.
Because the Mu-4000 is easily capable of sending millions of attack packets, testing projects can get complex in a hurry. To simplify the process, Mu Security has smartly configured all scanning activity around analysis templates. Creating and using a template is essentially a step-by-step process that the Mu-4000 leads you through while it defines attack types, monitors, and actions to take in response to events. You select protocols and a myriad of custom attack parameters in an attack template. Monitors allow you to capture more information on the target, including from its own management console and log files. For example, if your attack locks up the target, the Mu appliance can capture what the target device’s SSH-enabled management console looked like at the moment the device froze. Event triggers allow you to kick off external network monitors or initiate events such as file downloads on remote systems.
The resulting template is an XML file that can be sent to other Mu-4000 users so that they can duplicate your test. The management and configuration GUI is nearly flawless. It’s helpful and wizard-driven to a fault. If you don’t like GUIs, you can use XML files to drive the device instead.
When the Mu-4000 finds a vulnerability, it will duplicate the attack to confirm that it is re-creatable and, if so, will then step itself through the entire attack sequence to find out exactly which string of sent information caused the fault. Network packet captures are standard, and that information is included with the information gathered by other monitors to profile the problem. The Mu-4000 profiles security issues better than any other vulnerability assessment tool I’ve used. Reporting itself is good, but not excellent. Detailed and summary reports are included, but the Mu doesn't allow easy customization of reports, nor does it hook into Crystal Reports, for example.
My testing found two previously undocumented security vulnerabilities and more than a few performance issues. In one case, a single malformed packet locked up the target so badly the firmware had to be re-imaged to regain control. One of the Mu-4000’s best features is its capability to create a custom (Linux-based) binary that wraps any found vulnerability, essentially fingerprinting the security hole. You can download the self-documenting binary and send it to technicians so that they can re-create the problem without needing their own Mu-4000.
After running the Mu box, I asked myself why anyone should consider one of these pricey devices over the average free fuzzer off the Internet. First, the Mu-4000 has built-in fuzzing logic that you simply cannot find in free products. Mu's fuzzing is stateful, which allows the device to better mimic real-world conditions, and it is intelligent, methodically altering the state, structure, or semantics of a protocol in ways designed to expose weaknesses in the target. Mu’s development staff understands how a problem in one area translates into high problem likelihood in another, and they have designed the tests accordingly. Also, the Mu-4000 contains business logic and workflow that can turn untrained employees into a professional penetration team in a day.
The Mu-4000 Security Analyzer gets my strong buy recommendation for any company worried about unknown security vulnerabilities, and for security device vendors trying to make their products as secure as they can be.
Ease of use (20.0%)
Overall Score (100%)
|Mu-4000 Security Analyzer (Version 3.0)||8.0||9.0||8.0||9.0||9.0|
How far does Swift soar over Objective-C? Let us count the ways
Gordon Moore talks about his famous observation that paved the way for faster, smaller and cheaper...
Appboy's on-stage presentation at Demo Traction on April 22, 2015
Sponsored by Nuage Networks
Sponsored by Fibre Channel Industry Association
The few changes at worst do no harm to IT and in some cases may make things a little easier or safer
Charter's proposed merger with Time Warner may pass FCC scrutiny, but the outcome for consumers is...
All software has bugs, but even the most well known applications can have errors and vulnerabilities...
Is Eclipse overkill? Is Vim not enough? Then check out the new generation of code editors, led by...