Query data packet processing and network scanning method and apparatus
First Claim
1. A method, comprising:
- formatting a data field of a query data packet with a banner, the banner configured to elicit recognition by a target software;
formatting a command field of the query data packet with a command, the command configured to elicit a signature response when the command is processed by the target software;
identifying a number of keys equal to a modulus of an operating system contained on first and second computers;
encrypting the query data packet with each of the keys to produce a multitude of encrypted query data packets equal in number to the modulus and the number of keys, each of the multitude of encrypted query data packets encrypted using a different one of the keys;
storing the multitude of encrypted query data packets in a storage medium;
sending the multitude of encrypted query data packets to the first computer to determine whether the first computer contains the target software;
observing that the first computer contains the target software when at least one of the encrypted query data packets elicits the signature response on the first computer; and
scanning the second computer using the previously generated encrypted query data keys that are stored in the memory to determine whether the second computer contains the target software, the scanning occurring without generating a new query data packet and without re-encrypting the query data packet.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for detecting within a networked computer a target vulnerability such as a Trojan Horse residing therein is disclosed, wherein the vulnerability is characterized by a signature response to an encrypted query. The method includes encrypting a plurality of query data packets in accordance with a plurality of encryption keys, each encrypted query data packet including a defined query field specific to the target vulnerability. The method further includes storing the plurality of encrypted query data packets in a memory. The method further includes thereafter scanning the networked computer for a target vulnerability residing within the networked computer by sending successive ones of the encrypted-and-stored query data packets to the host computer and analyzing responses thereto from the host computer with respect to the characteristic signature. Preferably, the encrypting is performed for substantially all of the encryption keys within a defined key space. The memory may be non-volatile memory such as a disk drive or a volatile memory such as random-access memory (RAM) or a memory configured as a cache.
-
Citations
16 Claims
-
1. A method, comprising:
-
formatting a data field of a query data packet with a banner, the banner configured to elicit recognition by a target software; formatting a command field of the query data packet with a command, the command configured to elicit a signature response when the command is processed by the target software; identifying a number of keys equal to a modulus of an operating system contained on first and second computers; encrypting the query data packet with each of the keys to produce a multitude of encrypted query data packets equal in number to the modulus and the number of keys, each of the multitude of encrypted query data packets encrypted using a different one of the keys; storing the multitude of encrypted query data packets in a storage medium; sending the multitude of encrypted query data packets to the first computer to determine whether the first computer contains the target software; observing that the first computer contains the target software when at least one of the encrypted query data packets elicits the signature response on the first computer; and scanning the second computer using the previously generated encrypted query data keys that are stored in the memory to determine whether the second computer contains the target software, the scanning occurring without generating a new query data packet and without re-encrypting the query data packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
one or more processors for encrypting a query data packet in accordance with a plurality of different keys to generate a plurality of differently encrypted query data packets, the differently encrypted query data packets including one or more fields configured to elicit a signature response from a Trojan Horse; a memory device for storing, at a first time, a database comprising the differently encrypted query data packets; a transmitter for scanning a port on a computer, the scanning occurring at a second time that is later than the first time, the scanning using the database that was stored at the first time such that the scanning of the computer does not require on-the-fly generation of additional encrypted query data packets; and an analyzer for analyzing whether the computer processes the signature response in response to the scanning using the database. - View Dependent Claims (10, 11, 12, 13)
-
-
14. An apparatus, comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to; format a query data packet to elicit a signature response when the query data packet is processed by a target software; identify a plurality keys, an amount of the keys corresponding to an operating system contained on first and second computers; encrypt the query data packet with the keys to produce a multitude of encrypted query data packets equal in number to the amount of keys, each of the multitude of encrypted query data packets encrypted using a different one of the keys; store the multitude of encrypted query data packets in a storage medium; send the multitude of encrypted query data packets to the first computer to determine whether the first computer contains the target software; observe that the first computer contains the target software when at least one of the encrypted query data packets elicits the signature response on the first computer; and scan the second computer using the previously generated encrypted query data keys that are stored in the memory to determine whether the second computer contains the target software, the scanning occurring without requiring generation of a new query data packet and without requiring re-encryption of the query data packet. - View Dependent Claims (15, 16)
-
Specification