Systems and methods for selecting a termination rule for a penetration testing campaign
First Claim
Patent Images
1. A method of penetration testing of a networked system by a penetration testing system that is controlled by a user interface of a computing device so that a penetration testing campaign is executed until a termination condition is satisfied, the termination condition being manually and explicitly selected, the method comprising:
- a. receiving, by the penetration testing system and via the user interface of the computing device, one or more manually-entered inputs, the one or more manually-entered inputs explicitly selecting the termination condition for the penetration testing campaign, the termination condition being a member of the termination conditions group consisting of;
i. a termination condition associated with exporting one or more files out of the networked system;
ii. a termination condition associated with damaging one or more files;
iii. a termination condition associated with encrypting one or more files;
iv. a termination condition associated with a number of compromised network nodes;
v. a termination condition associated with a specific condition that is either true or false for each network node of the networked system;
vi. a termination condition associated with a specific defensive software application; and
vii. a termination condition associated with changing access rights of one or more files;
b. executing the penetration testing campaign, by the penetration testing system, so as to test the networked system;
c. checking, by the penetration testing system and while the penetration testing campaign is executing, whether the explicitly and manually-selected termination condition that is a member of the termination conditions group is satisfied;
d. in response to a determination by the checking that the explicitly and manually-selected termination condition that is a member of the termination conditions group is satisfied, terminating execution of the penetration testing campaign; and
e. reporting, by the penetration testing system, at least one security vulnerability determined to exist in the networked system by the executing of the penetration testing campaign, wherein the reporting comprises at least one of (i) causing a display device to display a report describing the at least one security vulnerability, (ii) storing the report describing the at least one security vulnerability in a file and (iii) electronically transmitting the report describing the at least one security vulnerability.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of penetration testing of a networked system by a penetration testing system that is controlled by a user interface of a computing device so that a penetration testing campaign is executed until a termination condition is satisfied, the termination condition being manually and explicitly selected and being an indirect termination condition.
-
Citations
30 Claims
-
1. A method of penetration testing of a networked system by a penetration testing system that is controlled by a user interface of a computing device so that a penetration testing campaign is executed until a termination condition is satisfied, the termination condition being manually and explicitly selected, the method comprising:
-
a. receiving, by the penetration testing system and via the user interface of the computing device, one or more manually-entered inputs, the one or more manually-entered inputs explicitly selecting the termination condition for the penetration testing campaign, the termination condition being a member of the termination conditions group consisting of; i. a termination condition associated with exporting one or more files out of the networked system; ii. a termination condition associated with damaging one or more files; iii. a termination condition associated with encrypting one or more files; iv. a termination condition associated with a number of compromised network nodes; v. a termination condition associated with a specific condition that is either true or false for each network node of the networked system; vi. a termination condition associated with a specific defensive software application; and vii. a termination condition associated with changing access rights of one or more files; b. executing the penetration testing campaign, by the penetration testing system, so as to test the networked system; c. checking, by the penetration testing system and while the penetration testing campaign is executing, whether the explicitly and manually-selected termination condition that is a member of the termination conditions group is satisfied; d. in response to a determination by the checking that the explicitly and manually-selected termination condition that is a member of the termination conditions group is satisfied, terminating execution of the penetration testing campaign; and e. reporting, by the penetration testing system, at least one security vulnerability determined to exist in the networked system by the executing of the penetration testing campaign, wherein the reporting comprises at least one of (i) causing a display device to display a report describing the at least one security vulnerability, (ii) storing the report describing the at least one security vulnerability in a file and (iii) electronically transmitting the report describing the at least one security vulnerability. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method of penetration testing of a networked system by a penetration testing system that is controlled by a user interface of a computing device so that a penetration testing campaign is executed until a termination condition is satisfied, the termination condition being manually and explicitly selected, the method comprising:
-
a. receiving, by the penetration testing system and via the user interface of the computing device, one or more manually-entered inputs, the one or more manually-entered inputs explicitly selecting the termination condition for the penetration testing campaign, the termination condition being an indirect termination condition; b. executing the penetration testing campaign, by the penetration testing system, so as to test the networked system; c. checking, by the penetration testing system and while the penetration testing campaign is executing, whether the explicitly and manually-selected indirect termination condition is satisfied; d. in response to a determination by the checking that the explicitly and manually-selected indirect termination condition is satisfied, terminating execution of the penetration testing campaign; and e. reporting, by the penetration testing system, at least one security vulnerability determined to exist in the networked system by the executing of the penetration testing campaign, wherein the reporting comprises at least one of (i) causing a display device to display a report describing the at least one security vulnerability, (ii) storing the report describing the at least one security vulnerability in a file and (iii) electronically transmitting the report describing the at least one security vulnerability.
-
-
29. A system of penetration testing of a networked system, the system comprising:
-
a. a termination-condition-selecting user interface including one or more user interface components for manual and explicit selection of a termination condition for a penetration testing campaign, where the termination-condition-selecting user interface resides in a computing device, the termination condition being a member of the termination conditions group consisting of; i. a termination condition associated with exporting one or more files out of the networked system; ii. a termination condition associated with damaging one or more files; iii. a termination condition associated with encrypting one or more files; iv. a termination condition associated with a number of compromised network nodes; v. a termination condition associated with a specific condition that is either true or false for each network node of the networked system; vi. a termination condition associated with a specific defensive software application; and vii. a termination condition associated with changing access rights of one or more files; b. a penetration-testing-campaign module including; i. one or more penetration-testing-campaign processors; and ii. a penetration-testing-campaign non-transitory computer readable storage medium for instructions execution by the one or more penetration-testing-campaign processors, the penetration-testing-campaign non-transitory computer readable storage medium having stored instructions to perform the penetration testing campaign so as to test the networked system, and to terminate the penetration testing campaign in response to a determination that the manually and explicitly-selected termination condition that is a member of the termination conditions group is satisfied; and c. a reporting module including; i. one or more reporting processors; and ii. a reporting non-transitory computer readable storage medium for instructions execution by the one or more reporting processors, the reporting non-transitory computer readable storage medium having stored instructions to report at least one security vulnerability determined to exist in the networked system according to results of the penetration testing campaign performed by the penetration-testing-campaign module, the instructions to report including at least one of (i) instructions to cause a display device to display a report describing the at least one security vulnerability, (ii) instructions to store the report describing the at least one security vulnerability in a file and (iii) instructions to electronically transmit the report describing the at least one security vulnerability.
-
-
30. A system of penetration testing of a networked system, the system comprising:
-
a. a termination-condition-selecting user interface including one or more user interface components for manual and explicit selection of a termination condition for a penetration testing campaign, where the termination-condition-selecting user interface resides in a computing device, the termination condition being an indirect termination condition; b. a penetration-testing-campaign module including; i. one or more penetration-testing-campaign processors; and ii. a penetration-testing-campaign non-transitory computer readable storage medium for instructions execution by the one or more penetration-testing-campaign processors, the penetration-testing-campaign non-transitory computer readable storage medium having stored instructions to perform the penetration testing campaign so as to test the networked system, and to terminate the penetration testing campaign in response to a determination that the manually and explicitly-selected indirect termination condition is satisfied; and c. a reporting module including; i. one or more reporting processors; and ii. a reporting non-transitory computer readable storage medium for instructions execution by the one or more reporting processors, the reporting non-transitory computer readable storage medium having stored instructions to report at least one security vulnerability determined to exist in the networked system according to results of the penetration testing campaign performed by the penetration-testing-campaign module, the instructions to report including at least one of (i) instructions to cause a display device to display a report describing the at least one security vulnerability, (ii) instructions to store the report describing the at least one security vulnerability in a file and (iii) instructions to electronically transmit the report describing the at least one security vulnerability.
-
Specification