Please download the dossier by clicking on the dossier button x
×

Using information about exportable data in penetration testing

  • US 10,469,521 B1
  • Filed: 04/10/2019
  • Issued: 11/05/2019
  • Est. Priority Date: 11/04/2018
  • Status: Active Grant
First Claim
Patent Images

1. A method of carrying out a penetration testing campaign of a networked system by a penetration testing system, using a lateral movement strategy based at least in part on information about files stored in network nodes of the networked system, the method comprising:

  • a. obtaining information about files stored in a plurality of network nodes of the networked system;

    b. based on the obtained information, determining, for each network node of the plurality of network nodes, a corresponding data-value score according to a common data-value metric;

    c. executing the penetration testing campaign, wherein the executing includes;

    i. selecting a target network node of the networked system that will be a next network node that the penetration testing system will attempt to compromise or will attempt to determine to be compromisable, the selecting being based on the data-value scores corresponding to at least some of the plurality of network nodes, andii. attempting to compromise the selected target network node or attempting to determine that the selected target network node is compromisable;

    d. based on results of the penetration testing campaign, determining a method by which an attacker could compromise the networked system; and

    e. reporting the method by which the attacker could compromise the networked system, wherein the reporting comprises at least one action selected from the group consisting of (i) causing a display device to display a report including information about the determined method by which the attacker could compromise the networked system, (ii) recording the report including the information about the determined method by which the attacker could compromise the networked system in a file, and (iii) electronically transmitting the report including the information about the determined method by which the attacker could compromise the networked system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×