Locally detecting phishing weakness
First Claim
1. A method of penetration testing of a network node by a penetration testing system, the penetration testing system comprising (A) a reconnaissance agent software module installed in the network node, and (B) a penetration testing software module installed on a remote computing device, the method comprising:
- a. sending to the network node, by the penetration testing software module, a test message containing at least one member selected from the group consisting of an Internet link and an attachment file;
b. detecting, in the network node and by the reconnaissance agent software module installed in the network node, an event occurring in the network node, the event being a member of the group consisting of an event of selecting of the Internet link by a user of the network node, an event of opening of the attachment file by the user of the network node, an event caused by the selecting of the Internet link, and an event caused by the opening of the attachment file;
c. sending, by the reconnaissance agent software module installed in the network node, a reporting message to the remote computing device, the reporting message containing information concerning an occurrence of the detected event;
d. making a determination, by the penetration testing software module, that the network node is vulnerable to an attack, the determination being based on the information concerning the occurrence of the detected event included in the reporting message; and
e. reporting the determination by the penetration testing software module, the reporting comprising at least one operation selected from the group consisting of;
(i) causing a display device to display information about the determination, (ii) recording the information about the determination in a file, and (iii) electronically transmitting the information about the determination.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems of testing for phishing security vulnerabilities are disclosed, including methods of penetration testing of a network node by a penetration testing system comprising a reconnaissance agent software module installed in the network node, and a penetration testing software module installed on a remote computing device. Penetration testing systems are provided so as to locally detect weaknesses that would expose network nodes to phishing-based attacks.
48 Citations
14 Claims
-
1. A method of penetration testing of a network node by a penetration testing system, the penetration testing system comprising (A) a reconnaissance agent software module installed in the network node, and (B) a penetration testing software module installed on a remote computing device, the method comprising:
-
a. sending to the network node, by the penetration testing software module, a test message containing at least one member selected from the group consisting of an Internet link and an attachment file; b. detecting, in the network node and by the reconnaissance agent software module installed in the network node, an event occurring in the network node, the event being a member of the group consisting of an event of selecting of the Internet link by a user of the network node, an event of opening of the attachment file by the user of the network node, an event caused by the selecting of the Internet link, and an event caused by the opening of the attachment file; c. sending, by the reconnaissance agent software module installed in the network node, a reporting message to the remote computing device, the reporting message containing information concerning an occurrence of the detected event; d. making a determination, by the penetration testing software module, that the network node is vulnerable to an attack, the determination being based on the information concerning the occurrence of the detected event included in the reporting message; and e. reporting the determination by the penetration testing software module, the reporting comprising at least one operation selected from the group consisting of;
(i) causing a display device to display information about the determination, (ii) recording the information about the determination in a file, and (iii) electronically transmitting the information about the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A penetration testing system for testing a network node on which a reconnaissance agent software module is installed, the penetration testing system comprising:
-
a. a remote computing device in electronic communication with the network node and comprising one or more processors, wherein a penetration testing software module of the penetration testing system is installed on the remote computing device; b. a first non-transitory computer-readable storage medium containing first program instructions, wherein execution of the first program instructions by one or more processors of the network node causes the one or more processors of the network node to carry out the following; i. in response to receiving, from the penetration testing software module installed on the remote computing device, a test message containing at least one member selected from the group consisting of an Internet link and an attachment file, detecting, in the network node and by the reconnaissance agent software module, an event occurring in the network node, the event being a member of the group consisting of an event of selecting of the link by a user of the network node, an event of opening of the attachment file by the user of the network node, an event caused by the selecting of the link, and an event caused by the opening of the attachment file, and ii. sending, by the reconnaissance agent software module, a reporting message to the remote computing device, the reporting message containing information concerning an occurrence of the detected event; and c. a second non-transitory computer-readable storage medium containing second program instructions, wherein execution of the second program instructions by one or more processors of the remote computing device causes the one or more processors of the remote computing device to carry out the following; i. in response to receiving the reporting message from the reconnaissance agent software module installed in the network node, making a determination, by the penetration testing software module, that the network node is vulnerable to an attack, the determination being based on the information concerning the occurrence of the detected event included in the reporting message, and ii. reporting the determination by the penetration testing software module, the reporting comprising at least one operation selected from the group consisting of;
(i) causing a display device to display information about the determination, (ii) recording the information about the determination in a file, and (iii) electronically transmitting the information about the determination.
-
Specification