Automated security testing
First Claim
Patent Images
1. A system for automated security testing, comprising:
- a processor that is adapted to execute stored instructions; and
a memory device that stores instructions, the memory device comprising processor-executable code, that when executed by the processor, is adapted to;
record a macro;
play the recorded macro while intercepting traffic from a web browser;
intercept a web request while playing the macro;
attack the web request;
send the web request to a web server;
receive a response from the web server based on the web request; and
process the response of the web server to determine any vulnerabilities.
8 Assignments
0 Petitions
Accused Products
Abstract
A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities.
-
Citations
15 Claims
-
1. A system for automated security testing, comprising:
-
a processor that is adapted to execute stored instructions; and a memory device that stores instructions, the memory device comprising processor-executable code, that when executed by the processor, is adapted to; record a macro; play the recorded macro while intercepting traffic from a web browser; intercept a web request while playing the macro; attack the web request; send the web request to a web server; receive a response from the web server based on the web request; and process the response of the web server to determine any vulnerabilities. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for automated security testing, comprising:
-
recording a macro; playing the recorded macro while a proxy server intercepts traffic from a web browser; intercepting a web request while playing the macro; attacking the web request; sending the web request to a web server; receiving a response from the web server based on the web request; and processing the response of the web server to determine any vulnerabilities. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory, computer-readable medium, comprising code configured to direct a processor to:
-
record a macro; play the recorded macro while intercepting traffic from a web browser; intercept a web request while playing the macro; attack the web request; send the web request to a web server; receive a response from the web server based on the web request; and process the response of the web server to determine any vulnerabilities. - View Dependent Claims (14, 15)
-
Specification