Review: Identifying the Behaviour of Vulnerabities by Attacking Server's Using Aject Tool
Today's networked computer systems yield great value to businesses and governments, but also create risks. Vulnerabilities in computer systems lead to security and privacy risks. The authors are going to present how automatically they can detect the vulnerabilities in a software system which is similar to how hackers and security analysts do to discover vulnerabilities in network through this paper. This methodology is implemented in a tool called AJECT which uses a specification of the server's communication protocol and predefined test case generation algorithms to automatically create a large number of attacks. When the attack has been injected on to the network this tool monitors the server execution in the target system and responds to the client.