×

Taking privilege escalation into account in penetration testing campaigns

  • US 10,462,177 B1
  • Filed: 06/06/2019
  • Issued: 10/29/2019
  • Est. Priority Date: 02/06/2019
  • Status: Active Grant
First Claim
Patent Images

1. A method of carrying out a penetration testing campaign of a networked system by a simulated penetration testing system for the purpose of determining a way for an attacker to compromise the networked system, wherein the simulated penetration testing system assigns a plurality of network nodes of the networked system to classes based on current information about the compromisability of the plurality of network nodes at a current state of the penetration testing campaign, the classes consisting of (i) a red class, wherein each network node that is a member of the red class is known to be compromisable by the attacker in a way that gives the attacker full control of the red-class-member network node, (ii) a blue class, wherein each network node that is a member of the blue class is not known to be compromisable by the attacker, and (iii) a purple class, wherein each network node that is a member of the purple class is known to be compromisable by the attacker in a way that does not give the attacker full control of the purple-class-member network node, the method comprising:

  • a. selecting a first target network node of the plurality of network nodes of the networked system;

    b. handling the first target network node, the handling of the first target network node comprising;

    i. based on the selected first target network node and based on the current assignment of the plurality of network nodes to the blue, red and purple classes, determining a first vulnerability that can compromise the first target network node;

    ii. checking whether compromising the first target network node using the first vulnerability would result in the attacker achieving full control of the first target network node; and

    iii. in response to determining that the compromising of the first target network node using the first vulnerability would result in the attacker achieving full control of the first target network node, assigning the first target network node to the red class;

    c. selecting a second target network node of the plurality of network nodes of the networked system;

    d. handling the second target network node, the handling of the second target network node comprising;

    i. based on the selected second target network node and based on the current assignment of the plurality of network nodes to the blue, red and purple classes, determining a second vulnerability that can compromise the second target network node;

    ii. checking whether compromising the second target network node using the second vulnerability would result in the attacker achieving full control of the second target network node; and

    iii. in response to determining that (i) the compromising of the second target network node using the second vulnerability would not result in the attacker achieving full control of the second target network node and (ii) the attacker would be able to achieve full control of the second target network node by using (A) one or more privilege escalation techniques and (B) one or more access rights to the second target network node obtained by the compromising of the second target network node using the second vulnerability, assigning the second target network node to the red class;

    e. selecting a third target network node of the plurality of network nodes of the networked system;

    f. handling the third target network node, the handling of the third target network node comprising;

    i. based on the selected third target network node and based on the current assignment of the plurality of network nodes to the blue, red and purple classes, determining a third vulnerability that can compromise the third target network node;

    ii. checking whether compromising the third target network node using the third vulnerability would result in the attacker achieving full control of the third target network node; and

    iii. in response to determining that (i) the compromising of the third target network node using the third vulnerability would not result in the attacker achieving full control of the third target network node and (ii) the attacker cannot achieve full control of the third target network node by using (A) any combination of privilege escalation techniques and (B) any combination of access rights to the third target network node obtained by the compromising of the third target network node using the third vulnerability, assigning the third target network node to the purple class;

    g. based on at least one of the first vulnerability, the second vulnerability and the third vulnerability, determining the way for an attacker to compromise the networked system; and

    h. reporting the determined way for an attacker to compromise the networked system, the reporting comprising at least one action selected from the actions group consisting of (i) causing a display device to display a report including information about the determined way to compromise the networked system, (ii) recording the report including the information about the determined way to compromise the networked system in a file, and (iii) electronically transmitting the report including the information about the determined way to compromise the networked system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×