Please download the dossier by clicking on the dossier button x
×

Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign

  • US 10,367,846 B2
  • Filed: 11/11/2018
  • Issued: 07/30/2019
  • Est. Priority Date: 11/15/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method for penetration testing of a networked system by a penetration testing system using both active and passive validation methods wherein the penetration testing system is controlled by a user interface of a computing device, the method for penetration testing comprising:

  • a. receiving, by the penetration testing system and via the user interface of the computing device, one or more manually-entered inputs;

    b. determining a first target network node of the networked system to be the next network node to attempt to compromise;

    c. determining a first vulnerability of network nodes to be used for compromising the first target network node;

    d. determining a first damage to the first target network node that can be caused by validating the first vulnerability for the first target network node by using active validation;

    e. selecting a first validation method for validating the first vulnerability for the first target network node, a type of the first validation method being;

    A. selected from the type group consisting of active validation and passive validation; and

    B. associated with the first damage;

    f. validating the first vulnerability for the first target network node using the first validation method;

    g. determining a second target network node of the networked system to be the next network node to attempt to compromise;

    h. determining a second vulnerability of network nodes to be used for compromising the second target network node;

    i. determining a second damage to the second target network node that can be caused by validating the second vulnerability for the second target network node by using active validation;

    j. selecting a second validation method for validating the second vulnerability for the second target network node, a type of the second validation method being;

    A. selected from the type group consisting of active validation and passive validation;

    B. associated with the second damage; and

    C. different from the type of the first validation method;

    k. validating the second vulnerability for the second target network node using the second validation method; and

    l. reporting at least one security vulnerability of the networked system determined to exist based on results of performing steps b-k, wherein the reporting comprises performing at least one operation selected from the group consisting of;

    (A) causing a display device to display a report containing information about the at least one security vulnerability of the networked system, (B) storing the report containing information about the at least one security vulnerability of the networked system in a file and (C) electronically transmitting the report containing information about the at least one security vulnerability of the networked system,wherein all of steps b-l are performed by the penetration testing system, and wherein the one or more manually-entered inputs received via the user interface explicitly define at least one item selected from the group consisting of (i) a type of a validation method associated with the first damage, and (ii) a type of a validation method associated with the second damage.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×