Codenomicon has released a new fuzzing tool for testing communication interfaces. The Defensics Traffic Capture Fuzzer loads threat vectors from sources like network analysers and vulnerability feeds, and automatically generates extensive tests to find zero-day threats in protocol implementations.

Fuzzing is a security testing technique for testing communication devices or business critical systems and applications..

According to Codenomicon, the Traffic Capture Fuzzer reads files in PCAP format, which is supported by network analysers and offers help at every stage of software development lifecycle. It is a black box testing tool which does not require access to source code for the tests of vulnerabilities. It finds and eliminates zero day exposure in communication software, network equipment or complex network service..

Ari takanen, CTO of Codenomicon said:In a matter of minutes from getting my hands on our traffic capture fuzzer, I was already testing a wide range of proprietary protocols, which had always worried me, but for which model based fuzzers would have been impossible to create. I can definitely see all of our customers benefiting from this solution.