Analyzing the security of communication protocols and channels for a pass through device
First Claim
Patent Images
1. A method for analyzing vulnerability of a pass-through network device under analysis (DUA) to protocol abuse of a network communications protocol, the method comprising:
- establishing a network connection for the sending of messages from a sender through the pass-through network DUA to a receiver, the single software application acting as both the sender and the receiver, making a TCP connection through the pass-through network DUA with the source and destination of the TCP connection controlled by the single software applicationsending multiple test messages from the from the sender port to the receiver probing vulnerability of the pass-through network DUA to protocol abuse of the network communications protocol;
receiving multiple response messages corresponding to the test messages; and
determining whether the pass-through network DUA has vulnerabilities by analyzing the sent test messages and the corresponding received response messages.
3 Assignments
0 Petitions
Accused Products
Abstract
A security analyzer includes a single software application that both sends test messages to a device under analysis (DUA) and receives response messages generated by the DUA in response to the test messages. In this way, synchronization of which response messages correspond to which test messages can be reduced or avoided. The software application further determines whether the DUA operated correctly by analyzing the received response messages.
-
Citations
20 Claims
-
1. A method for analyzing vulnerability of a pass-through network device under analysis (DUA) to protocol abuse of a network communications protocol, the method comprising:
-
establishing a network connection for the sending of messages from a sender through the pass-through network DUA to a receiver, the single software application acting as both the sender and the receiver, making a TCP connection through the pass-through network DUA with the source and destination of the TCP connection controlled by the single software application sending multiple test messages from the from the sender port to the receiver probing vulnerability of the pass-through network DUA to protocol abuse of the network communications protocol; receiving multiple response messages corresponding to the test messages; and determining whether the pass-through network DUA has vulnerabilities by analyzing the sent test messages and the corresponding received response messages. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A security analyzer device for analyzing vulnerability of a pass-through network device under analysis (DUA) to protocol abuse of a network communications protocol, the security analyzer device comprising:
-
at least two ports for making network connections to other devices; a computer processor for executing computer program instructions; and a computer-readable storage medium having executable computer program instructions for a single software application tangibly embodied thereon, the executable computer program instructions for the single software application comprising instructions for the computer processor to perform steps of; establishing a network connection for the sending of messages from a sender through the pass-through network DUA to a receiver, the single software application acting as both the sender and the receiver, making a TCP connection through the pass-through network DUA with the source and destination of the TCP connection controlled by the single software application sending multiple test messages from the from the sender port to the receiver probing vulnerability of the pass-through network DUA to protocol abuse of the network communications protocol; receiving multiple response messages corresponding to the test messages; and determining whether the pass-through network DUA has vulnerabilities by analyzing the sent test messages and the corresponding received response messages. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A non-transitory computer-readable recording medium having executable computer program instructions for a single software application stored thereon, the executable computer program instructions comprising instructions for performing the steps of:
-
establishing a network connection for the sending of messages from a sender through the pass-through network DUA to a receiver, the single software application acting as both the sender and the receiver, making a TCP connection through the pass-through network DUA with the source and destination of the TCP connection controlled by the single software application sending multiple test messages from the from the sender port to the receiver probing vulnerability of the pass-through network DUA to protocol abuse of the network communications protocol; receiving multiple response messages corresponding to the test messages; and
determining whether the pass-through network DUA has vulnerabilities by analyzing the sent test messages and the corresponding received response messages. - View Dependent Claims (18, 19, 20)
-
Specification