Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2007-06-05
2007-06-05
Moazzami, Nasser (Department: 2136)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C726S022000, C709S202000, C709S203000, C709S219000, C707S793000
Reexamination Certificate
active
10054307
ABSTRACT:
A system is provided for performing penetration testing of a target computer network by installing a remote agent in the target computer network. The system includes a local agent provided in a computer console and configured to receive and execute commands. A user interface is provided in the console and configured to send commands to and receive information from the local agent, process the information, and present the processed information. A database is configured to store the information received from the local agent. A network interface is connected to the local agent and configured to communicate with the remote agent installed in the target computer network via a network. Security vulnerability exploitation modules are provided for execution by the local agent and/or the remote agent.
REFERENCES:
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5600790 (1997-02-01), Barnstijn et al.
patent: 5812529 (1998-09-01), Czarnik et al.
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 6009456 (1999-12-01), Frew et al.
patent: 6070244 (2000-05-01), Orchier et al.
patent: 6081665 (2000-06-01), Nilsen et al.
patent: 6085243 (2000-07-01), Fletcher et al.
patent: 6108715 (2000-08-01), Leach et al.
patent: 6125390 (2000-09-01), Touboul
patent: 6137782 (2000-10-01), Sharon et al.
patent: 6185689 (2001-02-01), Todd, Sr. et al.
patent: 6202199 (2001-03-01), Wygodny et al.
patent: 6205122 (2001-03-01), Sharon et al.
patent: 6205551 (2001-03-01), Grosse
patent: 6205552 (2001-03-01), Fudge
patent: 6249886 (2001-06-01), Kalkunte
patent: 6286047 (2001-09-01), Ramanathan et al.
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 6574737 (2003-06-01), Kingsford et al.
patent: 7107347 (2006-09-01), Cohen
patent: 2003/0149741 (2003-08-01), Krooss
patent: WO 99/66383 (1999-12-01), None
patent: 0038036 (2000-06-01), None
patent: WO 01/33353 (2001-05-01), None
Stone, Martin, “Attack Agents Found On 3 Computers”, Daily News-Newsbytes, Feb. 15, 2000, entire document, URL: http://www.computeruser.com
ews/00/02/15
ews1.html.
Kargl, Frank, et al, “Protecting Web Servers from Distributed Denial of Service Attacks”, Univ. of Ulm, May 1, 2001, entire document, http://www.10.org/cdrom/papers/409/.
Melbourne, J., et al, ‘Penetration Testing for Web Applications (Part One)’, SecurityFocus, Jun. 16, 2003, entire document, http://www.securityfocus.com/infocus/1704.
Melbourne, J., et al, ‘Penetration Testing for Web Applications (Part Two)’, SecurityFocus, Jul. 3, 2003, entire document, http://www.securityfocus.com/infocus/1709.
Melbourne, J., et al, ‘Penetration Testing for Web Applications (Part Three)’, SecurityFocus, Aug. 20, 2003, entire document, http://www.securityfocus.com/infocus/1722.
Andrew J. Stewart., “Distributed Metastasis: A Computer Network Penetration Methodology,” [online] Aug. 12, 1999, XP-002325346. Retrieved from the Internet: <URL: http://www.csee.umbc.edu/cadip/docs/NetworkIntrusion/distributed—metastasis.pdf> [retrieved on Apr. 19, 2005].
Jeffrey W. Humphries, Curtis A. Carver, Jr., Udo W. Pooch: “Secure Mobile Agents for Network Vulnerability Scanning,” Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, [online] Jun. 6, 2000, XP002325347. United States Military Academy, West Point, NY. Retrieved from the Internet: <URL: http//www.itoc.usma.edu/marin/Wshop/Papers2000/TA1—4.pdf> [retrieved on Apr. 19, 2005].
Anomyme, “Securite Optimate—Seconde Edition,” Sep. 28, 1999, Campuspress, XP-002325348 (Machine Translated Abstract provided herewith).
Dan Farmer et al.; “Improving the Security of Your Site by Breaking Into it”; Sun Microsystems, Eindhoven University of Technology; http://www.fish.com/security/admin-guide-to-cracking.html., 1993.
Ajzenman Gustavo
Becedillas Gabriel
Burroni Javier
Caceres Maximiliano Gerardo
Friederichs Oliver
Baum Ronald
Core SDI, Incorporated
Moazzami Nasser
Nieves Peter A.
Sheehan Phinney Bass & Green PA
LandOfFree
Automated computer system security compromise does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Automated computer system security compromise, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automated computer system security compromise will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3824939