FAQ

Export Attacks (Perl/Python)
If a potential weakness/vulnerability is found then the script can be used to run the same attack to see the behavior of the DUT. This is especially helpful...
Wed, 8 Dec, 2021 at 7:06 PM
Monitoring Process for Linux: How does it work?
LINUX MONITORING For Linux monitoring you have several options to monitor your process, the first one is to use GnuDB (debugger). This open source and ...
Wed, 15 Dec, 2021 at 9:22 AM
Windows CLI and Linux CLI command-line parameters
The following command-line parameters are available in beSTORM Windows CLI and Linux CLI versions: Name Command Description Help --h Displays help ...
Mon, 14 Mar, 2022 at 8:23 AM
beSTORM Bluetooth Low Energy (BLE) Protocols Testing Guide
This guide covers testing for the following BLE protocols and modules in beSTORM: GAP GATT RSC A2DP iBeacon HID over GATT Testing environment requi...
Tue, 29 Mar, 2022 at 8:35 AM
beSTORM 12.3.8 (Windows) release notes
AutoSPS is now visible so that the Console version can access it. Added support for a custom Generator (for example, allow one for bluetooth). beSTORM Co...
Mon, 4 Apr, 2022 at 11:32 AM