POLLUTING RESULTS OF VULNERABILITY SCANS
1 Assignment
0 Petitions
Accused Products
Abstract
A security device may receive, from a server device, a response to a request. The request may be provided by an attacker device and may include a plurality of input values. The security device may determine the plurality of input values, included in the request, based on receiving the response. The security device may modify the response to form a modified response. The response may be modified to include information associated with the plurality of input values. The response may be modified in an attempt to prevent the attacker device from identifying a vulnerability, associated with the server device, based on the plurality of input values being included in the response. The security device may provide the modified response to the attacker device.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A security device, comprising:
-
a memory; and one or more processors, operatively connected to the memory, to; receive, from a server device, a response to a request, the request having been provided by an attacker device and including a plurality of input values, the response being indicative of a vulnerability associated with the server device based on the response including at least one reflected input value, of the plurality of input values, that is included in the request and reflected by the response; select a location within the response; modify the response to form a modified response, the response being modified by inserting information associated with at least one of the plurality of input values included in the request at the location within the response; and provide the modified response to the attacker device. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors, cause the one or more processors to; receive, from a server device, a response to a request, the request having been provided by an attacker device and including a plurality of input values, the response being indicative of a vulnerability associated with the server device based on the response including at least one reflected input value, of the plurality of input values, that is included in the request and reflected by the response; select a location within the response; modify the response to form a modified response, the response being modified by inserting information associated with at least one of the plurality of input values included in the request at the location within the response; and provide the modified response to the attacker device. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
35. A method, comprising:
-
receiving, by a security device and from a server device, a response to a request, the request having been provided by an attacker device and including a plurality of input values, the response being indicative of a vulnerability associated with the server device based on the response including at least one reflected input value, of the plurality of input values, that is included in the request and reflected by the response; selecting, by the security device, a location within the response; modifying, by the security device, the response to form a modified response, the response being modified by inserting information associated with at least one of the plurality of input values included in the request at the location within the response; and providing, by the security device, the modified response to the attacker device. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification