Patents by Inventor Gerardo Gabriel Richarte

Gerardo Gabriel Richarte has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8490196
    Abstract: A system and method for extending automated penetration testing of a target network is provided. The method comprises: computing a scenario, comprises the steps of: translating a workspace having at least one target computer in the target network, to a planning definition language, translating penetration modules available in a penetration testing framework to a planning definition language, and defining a goal in the target network and translating the goal into a planning definition language; building a knowledge database with information regarding the target network, properties of hosts in the network, parameters and running history of modules in the penetration testing framework; and running an attack plan solver module, comprising: running an attack planner using the scenario as input, to produce at least one attack plan that achieves the goal, and executing actions defined in the at least one attack plan against the target network from the penetration testing framework.
    Type: Grant
    Filed: August 5, 2010
    Date of Patent: July 16, 2013
    Assignee: Core Security Technologies
    Inventors: Jorge Lucangeli Obes, Carlos Emilio Sarraute Yamada, Gerardo Gabriel Richarte
  • Patent number: 8484738
    Abstract: A system and method provide application penetration testing. The system contains logic configured to find at least one vulnerability in the application so as to gain access to data associated with the application, logic configured to confirm the vulnerability and determine if the application can be compromised, and logic configured to compromise and analyze the application by extracting or manipulating data from a database associated with the application. In addition, the method provides for penetration testing of a target by: receiving at least one confirmed vulnerability of the target; receiving a method for compromising the confirmed vulnerability of the target; installing a network agent on the target in accordance with the method, wherein the network agent allows a penetration tester to execute arbitrary operating system commands on the target; and executing the arbitrary operating system commands on the target to analyze risk to which the target may be exposed.
    Type: Grant
    Filed: March 6, 2008
    Date of Patent: July 9, 2013
    Assignee: Core SDI Incorporated
    Inventors: Alberto Gustavo Soliño Testa, Gerardo Gabriel Richarte, Fernando Federico Russ, Diego Martin Kelyacoubian, Ariel Futoransky, Diego Bartolome Tiscornia, Ariel Waissbein, Hector Adrian Manrique, Javier Ricardo De Acha Campos, Eduardo Arias, Sebastian Pablo Cufre, Axel Elián Brzostowski
  • Publication number: 20110061104
    Abstract: A system and method for automated probabilistic planning of network attacks against infrastructures of computer networks and applications is provided. The embodiments automate the analysis and probabilistic planning of multi-step attacks to computer and application networks (in particular in the context of automating penetration tests), optimizing with respect to one of the following metrics: the probability of success of the actions, a numerical parameter that must be minimized (e.g., running time), or the number of logs generated by the control devices in the target network.
    Type: Application
    Filed: September 8, 2010
    Publication date: March 10, 2011
    Applicant: CORE SDI, INC.
    Inventors: Carlos Emilio Sarraute Yamada, Ariel Futoransky, Gerardo Gabriel Richarte, Jorge Lucangeli Obes
  • Publication number: 20110035803
    Abstract: A system and method for extending automated penetration testing of a target network is provided. The method comprises: computing a scenario, comprises the steps of: translating a workspace having at least one target computer in the target network, to a planning definition language, translating penetration modules available in a penetration testing framework to a planning definition language, and defining a goal in the target network and translating the goal into a planning definition language; building a knowledge database with information regarding the target network, properties of hosts in the network, parameters and running history of modules in the penetration testing framework; and running an attack plan solver module, comprising: running an attack planner using the scenario as input, to produce at least one attack plan that achieves the goal, and executing actions defined in the at least one attack plan against the target network from the penetration testing framework.
    Type: Application
    Filed: August 5, 2010
    Publication date: February 10, 2011
    Applicant: Core Security Technologies
    Inventors: Jorge Lucangeli Obes, Carlos Emilio Sarraute Yamada, Gerardo Gabriel Richarte
  • Patent number: 7757293
    Abstract: A system is provided for performing penetration testing of a target computer network by installing a remote agent in the target computer network. The system includes a local agent provided in a computer console and configured to receive and execute commands. A user interface is provided in the console and configured to send commands to and receive information from the local agent, process the information, and present the processed information. A database is configured to store the information received from the local agent. A network interface is connected to the local agent and configured to communicate with the remote agent installed in the target computer network via a network. Security vulnerability exploitation modules are provided for execution by the local agent and/or the remote agent.
    Type: Grant
    Filed: April 16, 2007
    Date of Patent: July 13, 2010
    Assignee: Core SDI, Incorporated
    Inventors: Maximiliano Gerardo Caceres, Gerardo Gabriel Richarte, Agustin Azubel Friedman, Ricardo Quesada, Luciano Notarfrancesco, Oliver Friederichs, Javier Burroni, Gustavo Ajzenman, Gabriel Becedillas, Bruce Leidl
  • Publication number: 20080263671
    Abstract: A system and method provide application penetration testing. The system contains logic configured to find at least one vulnerability in the application so as to gain access to data associated with the application, logic configured to confirm the vulnerability and determine if the application can be compromised, and logic configured to compromise and analyze the application by extracting or manipulating data from a database associated with the application. In addition, the method provides for penetration testing of a target by: receiving at least one confirmed vulnerability of the target; receiving a method for compromising the confirmed vulnerability of the target; installing a network agent on the target in accordance with the method, wherein the network agent allows a penetration tester to execute arbitrary operating system commands on the target; and executing the arbitrary operating system commands on the target to analyze risk to which the target may be exposed.
    Type: Application
    Filed: March 6, 2008
    Publication date: October 23, 2008
    Applicant: Core SDI, Incorporated
    Inventors: Alberto Gustavo Solino Testa, Gerardo Gabriel Richarte, Fernando Federico Russ, Diego Martin Kelyacoubian, Ariel Futoransky, Diego Bartolome Tiscornia, Ariel Waissbein, Hector Adrian Manrique, Javier Ricardo De Acha Campos, Eduardo Arias, Sebastian Pablo Cufre, Axel Elian Brzostowski
  • Patent number: 7277937
    Abstract: A system is provided for executing a system call originating in a local computer on a first remote computer connected to the local computer via a network. Communication is established between the local computer and the first remote computer via the network. A syscall server is installed in the first remote computer. A reference address is sent from the first remote computer to the local computer via the network through execution of code by the syscall server. A syscall request is built in the local computer with arguments determined using the reference address received from the first remote computer. The syscall request is sent from the local computer to the first remote computer via the network. The syscall request is copied into a stack of the first remote computer through execution of code by the syscall server. Registers are popped from the syscall request in the stack. Execution of a syscall request is initiated on the first remote computer. The result of the syscall request is pushed onto the stack.
    Type: Grant
    Filed: July 16, 2003
    Date of Patent: October 2, 2007
    Assignee: Core SDI, Incorporated
    Inventors: Maximiliano Gabriel Caceres, Javier Burroni, Gustavo Ajzenman, Ricardo Quesada, Gerardo Gabriel Richarte, Luciano Notarfrancesco, Bruce Robert Leidl, Agustin Azubel Friedman, Gabriel Martin Becedillas Ruiz
  • Patent number: 7228566
    Abstract: A system is provided for performing penetration testing of a target computer network by installing a remote agent in the target computer network. The system includes a local agent provided in a computer console and configured to receive and execute commands. A user interface is provided in the console and configured to send commands to and receive information from the local agent, process the information, and present the processed information. A database is configured to store the information received from the local agent. A network interface is connected to the local agent and configured to communicate with the remote agent installed in the target computer network via a network. Security vulnerability exploitation modules are provided for execution by the local agent and/or the remote agent.
    Type: Grant
    Filed: January 22, 2002
    Date of Patent: June 5, 2007
    Assignee: Core SDI, Incorporated
    Inventors: Maximiliano Gerardo Caceres, Gerardo Gabriel Richarte, Agustin Azubel Friedman, Ricardo Quesada, Luciano Notarfrancesco, Oliver Friederichs, Javier Burroni, Gustavo Ajzenman, Gabriel Becedillas, Bruce Leidl
  • Publication number: 20040128667
    Abstract: A system is provided for executing a system call originating in a local computer on a first remote computer connected to the local computer via a network. Communication is established between the local computer and the first remote computer via the network. A syscall server is installed in the first remote computer. A reference address is sent from the first remote computer to the local computer via the network through execution of code by the syscall server. A syscall request is built in the local computer with arguments determined using the reference address received from the first remote computer. The syscall request is sent from the local computer to the first remote computer via the network. The syscall request is copied into a stack of the first remote computer through execution of code by the syscall server. Registers are popped from the syscall request in the stack. Execution of a syscall request is initiated on the first remote computer. The result of the syscall request is pushed onto the stack.
    Type: Application
    Filed: July 16, 2003
    Publication date: July 1, 2004
    Applicant: Core SDI, Incorporated
    Inventors: Maximiliano Gerardo Caceres, Javier Burroni, Gustavo Ajzenman, Ricardo Quesada, Gerardo Gabriel Richarte, Luciano Notarfrancesco, Bruce Robert Leidl, Agustin Azubel Friedman, Gabriel Martin Becedillas Ruiz
  • Publication number: 20030220940
    Abstract: A system and method are provided for analyzing audit log data. Text strings from a plurality of devices are stored in a log database, each of the text strings being indicative of an audit event in the respective device. At least a portion of the text strings are retrieved from the log database and the retrieved text strings are parsed according to pre-defined parsing rules. Each of the retrieved text strings is mapped to a respective audit event. The retrieved text strings are mapped based on the respective audit event. Representations of the filtered text strings are displayed on a grid using color-coded areas. The horizontal axis of the grid represents a first time scale and the vertical axis of the grid represents a second time scale different from the first time scale.
    Type: Application
    Filed: April 15, 2003
    Publication date: November 27, 2003
    Applicant: Core SDI, Incorporated
    Inventors: Ariel Futoransky, Emiliano Kargieman, Diego Ariel Bendersky, Luciano Notarfrancesco, Gerardo Gabriel Richarte, Ivan Francisco Arce, Alejo Sanchez, Diego Ariel Aizemberg
  • Publication number: 20030177376
    Abstract: A system is provided for controlling access to information technology assets in a computer network. The system includes a ticket manager server configured to generate tickets based on user data in a master database. A ticket manager client, resident on a workstation, is configured to receive tickets from the ticket manager server and distribute resource data obtained from the tickets to network security modules. The user data includes resource registers, each of which has a type field designating a particular security module, resource data for use by the designated security module, and an execution domain field that exclusively designates an execution environment in which the designated security module can use the resource data.
    Type: Application
    Filed: January 30, 2003
    Publication date: September 18, 2003
    Applicant: Core SDI, Inc.
    Inventors: Ivan Francisco Fernando Arce Velleggia, Ariel Futoransky, Gerardo Gabriel Richarte, Emiliano Kargieman, Carlos Hernan Ochoa
  • Publication number: 20030014669
    Abstract: A system is provided for performing penetration testing of a target computer network by installing a remote agent in the target computer network. The system includes a local agent provided in a computer console and configured to receive and execute commands. A user interface is provided in the console and configured to send commands to and receive information from the local agent, process the information, and present the processed information. A database is configured to store the information received from the local agent. A network interface is connected to the local agent and configured to communicate with the remote agent installed in the target computer network via a network. Security vulnerability exploitation modules are provided for execution by the local agent and/or the remote agent.
    Type: Application
    Filed: January 22, 2002
    Publication date: January 16, 2003
    Inventors: Maximiliano Gerardo Caceres, Gerardo Gabriel Richarte, Agustin Azubel Friedman, Ricardo Quesada, Luciano Notarfrancesco, Oliver Friederichs, Javier Burroni, Gustavo Ajzenman, Gabriel Becedillas, Bruce Leidl