×

Emulating shellcode attacks

  • US 10,567,431 B2
  • Filed: 05/17/2016
  • Issued: 02/18/2020
  • Est. Priority Date: 05/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a target system from an intruder system, a shellcode including executable and operational instructions effective, when executed, to cause vulnerable software to receive and execute instructions using the shellcode, the vulnerable software including at least one of a service and an application, the target system not hosting the vulnerable software;

    detecting, by the target system, failure of installation of the shellcode on the target system; and

    in response to detecting failure of installation of the shellcode on the target system, performing (a) through (g), wherein (a) through (g) include(a) identifying, by the target system, a type of the shellcode;

    (b) selecting, by the target system, a shellcode emulator corresponding to the type of the shellcode, the target system not being vulnerable to the type of the shell code;

    (c) at least one of (i) binding the shellcode emulator to a port indicated by the shellcode and (ii) connecting the shellcode emulator to the intruder system;

    (d) receiving, by the target system, instructions from the intruder system directed to the shellcode, the shell code having failed to install on the target system;

    (e) executing, by the target system, the instructions by the shellcode emulator effective to simulate successful installation of the shellcode;

    (f) characterizing, by a detection system, behavior of the shellcode according to the instructions to generate a shellcode characterization; and

    (g) transmitting, by the detection system, the characterization to a plurality of computer systems.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×