Automated computer system security compromise

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C709S202000, C709S203000, C709S219000, C707S793000

Reexamination Certificate

active

10054307

ABSTRACT:
A system is provided for performing penetration testing of a target computer network by installing a remote agent in the target computer network. The system includes a local agent provided in a computer console and configured to receive and execute commands. A user interface is provided in the console and configured to send commands to and receive information from the local agent, process the information, and present the processed information. A database is configured to store the information received from the local agent. A network interface is connected to the local agent and configured to communicate with the remote agent installed in the target computer network via a network. Security vulnerability exploitation modules are provided for execution by the local agent and/or the remote agent.

REFERENCES:
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5600790 (1997-02-01), Barnstijn et al.
patent: 5812529 (1998-09-01), Czarnik et al.
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 6009456 (1999-12-01), Frew et al.
patent: 6070244 (2000-05-01), Orchier et al.
patent: 6081665 (2000-06-01), Nilsen et al.
patent: 6085243 (2000-07-01), Fletcher et al.
patent: 6108715 (2000-08-01), Leach et al.
patent: 6125390 (2000-09-01), Touboul
patent: 6137782 (2000-10-01), Sharon et al.
patent: 6185689 (2001-02-01), Todd, Sr. et al.
patent: 6202199 (2001-03-01), Wygodny et al.
patent: 6205122 (2001-03-01), Sharon et al.
patent: 6205551 (2001-03-01), Grosse
patent: 6205552 (2001-03-01), Fudge
patent: 6249886 (2001-06-01), Kalkunte
patent: 6286047 (2001-09-01), Ramanathan et al.
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 6574737 (2003-06-01), Kingsford et al.
patent: 7107347 (2006-09-01), Cohen
patent: 2003/0149741 (2003-08-01), Krooss
patent: WO 99/66383 (1999-12-01), None
patent: 0038036 (2000-06-01), None
patent: WO 01/33353 (2001-05-01), None
Stone, Martin, “Attack Agents Found On 3 Computers”, Daily News-Newsbytes, Feb. 15, 2000, entire document, URL: http://www.computeruser.com
ews/00/02/15
ews1.html.
Kargl, Frank, et al, “Protecting Web Servers from Distributed Denial of Service Attacks”, Univ. of Ulm, May 1, 2001, entire document, http://www.10.org/cdrom/papers/409/.
Melbourne, J., et al, ‘Penetration Testing for Web Applications (Part One)’, SecurityFocus, Jun. 16, 2003, entire document, http://www.securityfocus.com/infocus/1704.
Melbourne, J., et al, ‘Penetration Testing for Web Applications (Part Two)’, SecurityFocus, Jul. 3, 2003, entire document, http://www.securityfocus.com/infocus/1709.
Melbourne, J., et al, ‘Penetration Testing for Web Applications (Part Three)’, SecurityFocus, Aug. 20, 2003, entire document, http://www.securityfocus.com/infocus/1722.
Andrew J. Stewart., “Distributed Metastasis: A Computer Network Penetration Methodology,” [online] Aug. 12, 1999, XP-002325346. Retrieved from the Internet: <URL: http://www.csee.umbc.edu/cadip/docs/NetworkIntrusion/distributed—metastasis.pdf> [retrieved on Apr. 19, 2005].
Jeffrey W. Humphries, Curtis A. Carver, Jr., Udo W. Pooch: “Secure Mobile Agents for Network Vulnerability Scanning,” Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, [online] Jun. 6, 2000, XP002325347. United States Military Academy, West Point, NY. Retrieved from the Internet: <URL: http//www.itoc.usma.edu/marin/Wshop/Papers2000/TA1—4.pdf> [retrieved on Apr. 19, 2005].
Anomyme, “Securite Optimate—Seconde Edition,” Sep. 28, 1999, Campuspress, XP-002325348 (Machine Translated Abstract provided herewith).
Dan Farmer et al.; “Improving the Security of Your Site by Breaking Into it”; Sun Microsystems, Eindhoven University of Technology; http://www.fish.com/security/admin-guide-to-cracking.html., 1993.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Automated computer system security compromise does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Automated computer system security compromise, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automated computer system security compromise will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3824939

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.