The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jul. 09, 2013
Filed:
Mar. 06, 2008
Alberto Gustavo Soliño Testa, Buenos Aires, AR;
Gerardo Gabriel Richarte, Buenos Aires, AR;
Fernando Federico Russ, Buenos Aires, AR;
Diego Martin Kelyacoubian, Buenos Aires, AR;
Ariel Futoransky, Buenos Aires, AR;
Diego Bartolome Tiscornia, Buenos Aires, AR;
Ariel Waissbein, Buenos Aires, AR;
Hector Adrian Manrique, Buenos Aires, AR;
Javier Ricardo DE Acha Campos, Buenos Aires, AR;
Eduardo Arias, Buenos Aires, AR;
Sebastian Pablo Cufre, Buenos Aires, AR;
Axel Elián Brzostowski, Buenos Aires, AR;
Alberto Gustavo Soliño Testa, Buenos Aires, AR;
Gerardo Gabriel Richarte, Buenos Aires, AR;
Fernando Federico Russ, Buenos Aires, AR;
Diego Martin Kelyacoubian, Buenos Aires, AR;
Ariel Futoransky, Buenos Aires, AR;
Diego Bartolome Tiscornia, Buenos Aires, AR;
Ariel Waissbein, Buenos Aires, AR;
Hector Adrian Manrique, Buenos Aires, AR;
Javier Ricardo De Acha Campos, Buenos Aires, AR;
Eduardo Arias, Buenos Aires, AR;
Sebastian Pablo Cufre, Buenos Aires, AR;
Axel Elián Brzostowski, Buenos Aires, AR;
Core SDI Incorporated, Boston, MA (US);
Abstract
A system and method provide application penetration testing. The system contains logic configured to find at least one vulnerability in the application so as to gain access to data associated with the application, logic configured to confirm the vulnerability and determine if the application can be compromised, and logic configured to compromise and analyze the application by extracting or manipulating data from a database associated with the application. In addition, the method provides for penetration testing of a target by: receiving at least one confirmed vulnerability of the target; receiving a method for compromising the confirmed vulnerability of the target; installing a network agent on the target in accordance with the method, wherein the network agent allows a penetration tester to execute arbitrary operating system commands on the target; and executing the arbitrary operating system commands on the target to analyze risk to which the target may be exposed.