System and Method for Detecting Vulnerabilities in Voice Over IP Networks
First Claim
1. A method for detecting vulnerabilities in voice over IP networks comprising the steps of:
- receiving at least one network identifier that identifies one or more target networks to scan;
using the at least one network identifier to analyze an associated network to determine whether at least one voice over IP network is present;
if at least one voice over IP network is determined to be present, then receiving one or more scan options that specify how the at least one voice over IP network should be scanned for vulnerabilities;
performing a scan of the at least one voice over IP network based upon the one or more scan options to identify if a particular one or more vulnerabilities is present; and
outputting a scan result.
0 Assignments
0 Petitions
Accused Products
Abstract
A computer system and method for discovering voice over IP networks and detecting related vulnerabilities. The user identifies target servers or a network representing several targets to scan, and the system scans the specified servers to identify which support voice over IP services. The system returns a list of servers identified, and the user can export the list to the scanner. The scanner allows the user to specify scan options and then initiate a scan against specified servers or a network. The system performs the scan based on the scan options specified by the user, and displays the scan results to the user, such as one or more vulnerabilities found on the specified servers. The user can prioritize and categorize the collected data based on configurable settings. The user can also send a particular type of message to a voice over IP network and see the result.
34 Citations
20 Claims
-
1. A method for detecting vulnerabilities in voice over IP networks comprising the steps of:
-
receiving at least one network identifier that identifies one or more target networks to scan;
using the at least one network identifier to analyze an associated network to determine whether at least one voice over IP network is present;
if at least one voice over IP network is determined to be present, then receiving one or more scan options that specify how the at least one voice over IP network should be scanned for vulnerabilities;
performing a scan of the at least one voice over IP network based upon the one or more scan options to identify if a particular one or more vulnerabilities is present; and
outputting a scan result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable medium having computer-executable instructions for causing a computer to perform steps comprising:
-
provide a component discovery tool, the component discovery tool being operable to receive input from a user to identify a target network, and to scan the target network to discover at least one voice over IP network present on the target network; and
provide a vulnerability scanner tool, the vulnerability scanner tool being operable to receive at least one scan setting from the user, and to use the at least one scan setting to perform a test against the at least one voice over IP network to attempt to locate at least one vulnerability. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method for mapping voice over IP networks comprising the steps of:
-
providing a security tool for detecting vulnerabilities in voice over IP networks;
programmatically identifying a plurality of voice over IP components using the security tool;
generating a visualization map of the plurality of voice over IP components; and
receiving input from a user to specify an importance level of at least one of the plurality of voice over IP components present on the visualization map. - View Dependent Claims (19, 20)
-
Specification