Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
First Claim
1. A method for penetration testing of a networked system by a penetration testing system using both active and passive validation methods during a single penetration testing campaign, the method for penetration testing comprising:
- a. determining a first target network node of the networked system to be the next network node to attempt to compromise during the single penetration testing campaign;
b. determining a first vulnerability of network nodes to be used for compromising the first target network node;
c. selecting a first validation method for validating the first vulnerability for the first target network node, a type of the first validation method being selected from the type group consisting of active validation and passive validation;
d. validating the first vulnerability for the first target network node using the first validation method;
e. determining a second target network node of the networked system to be the next network node to attempt to compromise during the single penetration testing campaign;
f. determining a second vulnerability of network nodes to be used for compromising the second target network node;
g. selecting a second validation method for validating the second vulnerability for the second target network node, a type of the second validation method being selected from the type group consisting of active validation and passive validation and being different from the type of the first validation method;
h. validating the second vulnerability for the second target network node using the second validation method; and
i. reporting at least one security vulnerability of the networked system determined to exist based on results of the executing of the single penetration testing campaign, wherein the reporting comprises performing at least one operation selected from the group consisting of;
(A) causing a display device to display a report containing information about the at least one security vulnerability of the networked system,(B) storing the report containing information about the at least one security vulnerability of the networked system in a file and (C) electronically transmitting the report containing information about the at least one security vulnerability of the networked system,wherein all of steps a-i are performed by the penetration testing system, and all of steps a-h are performed during the single penetration testing campaign.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
-
Citations
16 Claims
-
1. A method for penetration testing of a networked system by a penetration testing system using both active and passive validation methods during a single penetration testing campaign, the method for penetration testing comprising:
-
a. determining a first target network node of the networked system to be the next network node to attempt to compromise during the single penetration testing campaign; b. determining a first vulnerability of network nodes to be used for compromising the first target network node; c. selecting a first validation method for validating the first vulnerability for the first target network node, a type of the first validation method being selected from the type group consisting of active validation and passive validation; d. validating the first vulnerability for the first target network node using the first validation method; e. determining a second target network node of the networked system to be the next network node to attempt to compromise during the single penetration testing campaign; f. determining a second vulnerability of network nodes to be used for compromising the second target network node; g. selecting a second validation method for validating the second vulnerability for the second target network node, a type of the second validation method being selected from the type group consisting of active validation and passive validation and being different from the type of the first validation method; h. validating the second vulnerability for the second target network node using the second validation method; and i. reporting at least one security vulnerability of the networked system determined to exist based on results of the executing of the single penetration testing campaign, wherein the reporting comprises performing at least one operation selected from the group consisting of; (A) causing a display device to display a report containing information about the at least one security vulnerability of the networked system, (B) storing the report containing information about the at least one security vulnerability of the networked system in a file and (C) electronically transmitting the report containing information about the at least one security vulnerability of the networked system, wherein all of steps a-i are performed by the penetration testing system, and all of steps a-h are performed during the single penetration testing campaign. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A penetration testing system for executing penetration testing of a networked system using both active and passive validation methods during a single penetration testing campaign, the penetration testing system comprising:
-
a. a remote computing device comprising a computer memory and one or more processors, the remote computing device in networked communication with multiple network nodes of the networked system; and b. a non-transitory computer-readable storage medium containing program instructions, wherein execution of the program instructions by the one or more processors of the remote computing device performs all of the following operations during the single penetration testing campaign; i. determining a first target network node of the networked system to be the next network node to attempt to compromise during the single penetration testing campaign; ii. determining a first vulnerability of network nodes to be used for compromising the first target network node; iii. selecting a first validation method for validating the first vulnerability for the first target network node, a type of the first validation method being selected from the type group consisting of active validation and passive validation; iv. causing validation of the first vulnerability for the first target network node using the first validation method; v. determining a second target network node of the networked system to be the next network node to attempt to compromise during the single penetration testing campaign; vi. determining a second vulnerability of network nodes to be used for compromising the second target network node; vii. selecting a second validation method for validating the second vulnerability for the second target network node, a type of the second validation method being selected from the type group consisting of active validation and passive validation and being different from the type of the first validation method; and viii. causing a validation of the second vulnerability for the second target network node using the second validation method; wherein the execution of the program instructions by the one or more processors of the remote computing device further performs the following operation; reporting at least one security vulnerability of the networked system determined to exist based on results of executing the single penetration testing campaign, wherein the reporting comprises performing at least one operation selected from the group consisting of;
(A) causing a display device to display a report containing information about the at least one security vulnerability of the networked system, (B) storing the report containing information about the at least one security vulnerability of the networked system in a file and (C) electronically transmitting the report containing information about the at least one security vulnerability of the networked system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification