SYSTEM AND METHOD FOR PROVIDING NETWORK PENETRATION TESTING
First Claim
1. A method of providing network penetration testing from an end-user computer, wherein the method comprises the steps of:
- determining at least one of a group consisting of a version of a Web browser of a target computer, contact information associated with an end-user that uses the target computer, and applications running on the target computer;
determining exploits that are associated with the running applications and that can be used to compromise the target computer; and
launching the exploits to compromise the target computer.
13 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing network penetration testing from an end-user computer is provided. The method includes the step of determining at least one of a version of a Web browser of a target computer, contact information associated with an end-user that uses the target computer, and applications running on the target computer. The method also includes the steps of determining exploits that are associated with the running applications and that can be used to compromise the target computer, and launching the exploits to compromise the target computer. Network penetration testing may also be provided by performing the steps of determining an operating system of a target computer, selecting one of a group of modules to use in detecting services of the target computer, and detecting the services of the target computer.
-
Citations
4 Claims
-
1. A method of providing network penetration testing from an end-user computer, wherein the method comprises the steps of:
-
determining at least one of a group consisting of a version of a Web browser of a target computer, contact information associated with an end-user that uses the target computer, and applications running on the target computer; determining exploits that are associated with the running applications and that can be used to compromise the target computer; and launching the exploits to compromise the target computer. - View Dependent Claims (2, 3)
-
-
4. A method of providing network penetration testing from an end-user computer, wherein the method comprises the steps of:
-
determining an operating system of a target computer; selecting one of a group of modules to use in detecting services of the target computer; and detecting the services of the target computer.
-
Specification