×

Verifying success of compromising a network node during penetration testing of a networked system

  • US 10,257,220 B2
  • Filed: 05/18/2018
  • Issued: 04/09/2019
  • Est. Priority Date: 01/30/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method of carrying out a penetration testing campaign of a networked system by a penetration testing system, the penetration testing system comprising (A) a penetration testing software module installed on a remote computing device and (B) a reconnaissance agent software module (RASM) installed on at least some network nodes of the networked system, the method comprising:

  • a. subsequent to installing the RASM on the at least some network nodes, initiating the penetration testing campaign;

    b. subsequent to the initiating of the penetration testing campaign, selecting a target network node of the networked system on which the RASM is installed;

    c. based on the target network node, selecting a potential vulnerability that may compromise the target network node;

    d. subsequent to the selecting of the potential vulnerability, receiving at the remote computing device and from the RASM installed on the target network node, internal data of the target network node;

    e. validating that the target network node could be successfully compromised using the selected potential vulnerability, the validating being carried out in a manner which does not expose the target network node to a risk of being compromised and which is based on the received internal data of the target network node;

    f. based on the potential vulnerability, determining a method for an attacker to compromise the target network node;

    g. based on the method for an attacker to compromise the target network node, determining a security vulnerability of the networked system; and

    h. reporting the security vulnerability of the networked system, the reporting comprising at least one of (i) causing a display device to display a report including information about the determined security vulnerability of the networked system, (ii) recording the report including the information about the determined security vulnerability of the networked system in a file, and (iii) electronically transmitting the report including the information about the determined security vulnerability of the networked system,wherein each of steps a-h is performed by executing computer code of the penetration testing software module by one or more processors of the remote computing device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×