-
公开(公告)号:US20210336971A1
公开(公告)日:2021-10-28
申请号:US16857039
申请日:2020-04-23
申请人: SPECTER OPS, INC.
摘要: A system and method for analyzing directory service environment attack paths for an enterprise may continuously collect data about the attack paths and provide alerts. The system and method may also analyze the nested object relationships within Directory Services alongside objects at risk for Credential Theft to calculate all possible attack paths within the environment.
-
公开(公告)号:US20230078044A1
公开(公告)日:2023-03-16
申请号:US17989591
申请日:2022-11-17
申请人: Specter Ops, Inc.
发明人: Andrew ROBBINS , Rohan VAZARKAR , John HOPPER
摘要: A system and method for analyzing directory service environment attack path choke points for an enterprise may continuously collect data about the attack paths and provide alerts.
-
公开(公告)号:US11539725B2
公开(公告)日:2022-12-27
申请号:US17473370
申请日:2021-09-13
申请人: SPECTER OPS, INC.
发明人: Andrew Robbins , Rohan Vazarkar , John Hopper
摘要: A system and method for analyzing directory service environment attack path choke points for an enterprise may continuously collect data about the attack paths and provide alerts.
-
公开(公告)号:USD956778S1
公开(公告)日:2022-07-05
申请号:US29746055
申请日:2020-08-11
申请人: Specter Ops. Inc.
设计人: Andrew Robbins , Rohan Vazarkar
-
公开(公告)号:USD956777S1
公开(公告)日:2022-07-05
申请号:US29746053
申请日:2020-08-11
申请人: Specter Ops. Inc.
设计人: Andrew Robbins , Rohan Vazarkar
-
公开(公告)号:US20220368702A1
公开(公告)日:2022-11-17
申请号:US17473370
申请日:2021-09-13
申请人: SPECTER OPS, INC.
发明人: Andrew ROBBINS , Rohan VAZARKAR , John HOPPER
摘要: A system and method for analyzing directory service environment attack path choke points for an enterprise may continuously collect data about the attack paths and provide alerts.
-
公开(公告)号:USD956779S1
公开(公告)日:2022-07-05
申请号:US29746056
申请日:2020-08-11
申请人: Specter Ops. Inc.
设计人: Andrew Robbins , Rohan Vazarkar
-
公开(公告)号:US11032298B1
公开(公告)日:2021-06-08
申请号:US17144789
申请日:2021-01-08
申请人: Specter Ops, Inc.
摘要: A system and method for analyzing directory service environment attack paths for an enterprise may continuously collect data about the attack paths and provide alerts. The system and method may also analyze the nested object relationships within Directory Services alongside objects at risk for Credential Theft to calculate all possible attack paths within the environment.
-
-
-
-
-
-
-