US 12,231,455 B2
Feedback loop for automated vulnerability scanning of hidden network systems
Jeffrey Rowell, Aurora, CO (US); and Charles Manser, Clearwater, FL (US)
Assigned to Charter Communications Operating, LLC, St. Louis, MO (US)
Filed by Charter Communications Operating, LLC, St. Louis, MO (US)
Filed on Nov. 30, 2022, as Appl. No. 18/072,022.
Prior Publication US 2024/0179171 A1, May 30, 2024
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) 18 Claims
OG exemplary drawing
 
1. A method comprising:
scanning, by a network vulnerability scanning system, a target device for vulnerabilities to obtain initial network connection data for the target device via a first network interface of the target device, the initial network connection data identifying an initial network connection between the target device and a first hidden network system;
installing, by the network vulnerability scanning system, a network scanning application on the target device subsequent to scanning the target device for vulnerabilities to obtain the initial network connection data;
scanning, by the network vulnerability scanning system, the first hidden network system for vulnerabilities via the network scanning application; and
subsequent to scanning the first hidden network system for vulnerabilities, obtaining, by the network vulnerability scanning system, additional network connection data for the target device via the first network interface of the target device, the additional network connection data identifying an additional network connection between the target device and a second hidden network system.