×

Penetration testing of a networked system

  • US 10,637,882 B2
  • Filed: 01/18/2018
  • Issued: 04/28/2020
  • Est. Priority Date: 01/30/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method for executing a penetration test of a networked system by a penetration testing system so as to determine a method for an attacker to compromise the networked system, where the penetration testing system comprises (A) a penetration testing software module installed on a remote computing device and (B) a reconnaissance agent software module (RASM) installed on at least some network nodes of the networked system so that each network node of the networked system on which the RASM is installed is defined as a RASM-hosting network node, the method for executing the penetration test comprising:

  • a. obtaining, by each given RASM-hosting network node of one or more RASM-hosting network nodes, respective data of the given RASM-hosting network node, the obtaining comprising executing computer code of the RASM by one or more processors of the given RASM-hosting network node, the respective data including data about at least one member selected from the group consisting of;

    A. an event of the given RASM-hosting network node,B. a condition of the given RASM-hosting network node, andC. a fact of the given RASM-hosting network node;

    b. transmitting to the remote computing device, by each given RASM-hosting network node of the one or more RASM-hosting network nodes, the obtained respective data of the given RASM-hosting network node, the transmitting comprising executing computer code of the RASM by the one or more processors of the given RASM-hosting network node;

    c. assessing, by the remote computing device, and based on the data transmitted by at least one RASM-hosting network node of the one or more RASM-hosting network nodes, if a first network node of the networked system can be compromised;

    d. in response to assessing that the first network node of the networked system can be compromised, simulating or evaluating, by the remote computing device, a result of compromising the first network node of the networked system;

    e. determining, by the remote computing device and based on the result of the compromising of the first network node of the networked system, that a second network node of the networked system can be compromised, wherein the determining that the second network node of the networked system can be compromised comprises (i) using knowledge about known methods of compromising networks or computing devices, and (ii) executing computer code of the penetration testing software module by one or more processors of the remote computing device;

    f. determining, by the remote computing device and based on the determining that the second network node of the networked system can be compromised, the method for the attacker to compromise the networked system; and

    g. reporting, by the remote computing device of the penetration testing system, the determined method for the attacker to compromise the networked system, the reporting comprising executing computer code of the penetration testing software module by the one or more processors of the remote computing device, wherein the reporting comprises at least one operation selected from the group consisting of (i) causing a display device to display a report including information about the determined method for the attacker to compromise the networked system, (ii) recording the report including the information about the determined method for the attacker to compromise the networked system in a file, and (iii) electronically transmitting the report including the information about the determined method for the attacker to compromise the networked system,wherein the method for executing the penetration test is such that no network node of the networked system is put at risk of being compromised by the executing of the penetration test.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×