Try our new research platform with insights from 80,000+ expert users

Defensics Protocol Fuzzing vs w3af comparison

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Defensics Protocol Fuzzing
Average Rating
8.6
Number of Reviews
4
Ranking in other categories
Fuzz Testing Tools (4th)
w3af
Average Rating
8.0
Number of Reviews
1
Ranking in other categories
Application Security Tools (39th)
 

Mindshare comparison

Defensics Protocol Fuzzing and w3af aren’t in the same category and serve different purposes. Defensics Protocol Fuzzing is designed for Fuzz Testing Tools and holds a mindshare of 17.6%, down 20.0% compared to last year.
w3af, on the other hand, focuses on Application Security Tools, holds 0.6% mindshare, up 0.1% since last year.
Fuzz Testing Tools Mindshare Distribution
ProductMindshare (%)
Defensics Protocol Fuzzing17.6%
PortSwigger Burp Suite Professional33.2%
GitLab26.6%
Other22.599999999999994%
Fuzz Testing Tools
Application Security Tools Mindshare Distribution
ProductMindshare (%)
w3af0.6%
SonarQube16.3%
Checkmarx One9.9%
Other73.19999999999999%
Application Security Tools
 

Featured Reviews

SK
Senior Technical Lead at HCL Technologies
Product security tests for switches and router sections
Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install. What I see in the documentation isn't that. Even if something doesn't malfunction, sometimes it is hard to install and execute. The product needs video documentation. This would help a lot more.
OS
Information Security Advisor, CISO & CIO, Docutek Services at Docutek Services
It's buggy and seems to try to do too many things, but having this on a USB drive has been valuable.
I tried to install this on numerous systems and eventually, with help, I got it running. It needs far too many dependencies installed and there's too much messing about to be of much use. Once running, it's buggy and begs the question can it be relied upon? Even within Kali it reports website time-outs, yet Zap or Burp are able to do a successful scan. I wanted this to work so much and be able to use it as an additional check of my results but have now binned it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Whatever the test suit they give, it is intelligent. It will understand the protocol and it will generate the test cases based on the protocol: protocol, message sequence, protocol, message structure... Because of that, we can eliminate a lot of unwanted test cases, so we can execute the tests and complete them very quickly."
"Whatever the test suit they give, it is intelligent; it will understand the protocol and it will generate the test cases based on the protocol: protocol, message sequence, protocol, message structure, and because of that, we can eliminate a lot of unwanted test cases so we can execute the tests and complete them very quickly."
"ROI was 100%. Since there are no product suites available that provide the level of testing available with Codenomicon, the development, quality and security assurance departments know that the investment was correct."
"The stability of this product is great; we tested it under multiple constraints and even on cloud services it is absolutely stable."
"We have found multiple issues in our embedded system network protocols, related to buffer overflow. We have reduced some of these issues."
"Simple and straightforward GUI."
"The product is related to US usage with TLS contact fees, i.e. how more data center connections will help lower networking costs."
"The best free software for pen testing web applications."
 

Cons

"Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install."
"Sometimes, when we are testing embedded devices, when we trigger the test cases, the target will crash immediately. It is very difficult for us to identify the root cause of the crash because they do not provide sophisticated tools on the target side."
"It does not support the complete protocol stack. There are some IoT protocols that are not supported and new protocols that are not supported."
"Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install."
"It requires understanding the Defensics protocol."
"Sometimes, when we are testing embedded devices, when we trigger the test cases, the target will crash immediately. It is very difficult for us to identify the root cause of the crash because they do not provide sophisticated tools on the target side. They cover only the client-side application... They do not have diagnostic tools for the target side. Rather, they have them but they are very minimal and not very helpful."
"You can't implement proprietary ciphering algorithms, nor can you modify protocol models if you need to test customized public protocols."
"Unfortunately, once you get around the seemingly strict set of pre-requisites to install it, it is incredibly buggy."
 

Pricing and Cost Advice

"Licensing is a bit expensive."
Information not available
report
Use our free recommendation engine to learn which Fuzz Testing Tools solutions are best for your needs.
885,286 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Manufacturing Company
15%
Financial Services Firm
8%
Retailer
5%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Also Known As

Codenomicon Defensics
No data available
 

Overview

 

Sample Customers

Coriant, CERT-FI, Next Generation Networks
Information Not Available