×

METHOD AND SYSTEM SIMULATING A HACKING ATTACK ON A NETWORK

  • US 20100138925A1
  • Filed: 05/22/2008
  • Published: 06/03/2010
  • Est. Priority Date: 05/24/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for simulating a hacking attack on a Network, wherein the Network comprises at least one of a plurality of data processing units (DPUs), a plurality of users and a plurality of communication links, to assess vulnerabilities of the Network, the method comprising:

  • (a) receiving one or more scan parameters from a system;

    (b) creating at least one master agent by the system to gather information about the Network, wherein the information pertains to critical and non-critical information about the Network;

    (c) performing Social Engineering analysis on the Network to find out vulnerabilities associated with the plurality of users;

    (d) performing Link Analysis on the communication taking place among two or more users or the plurality of DPUs to find out critical information flowing as a result of communication;

    (e) creating or updating an Information Model, wherein the Information Model comprises the information gathered by the at least one master agent about the plurality of DPUs, the plurality of users, the plurality of communication links and their relationships;

    (f) generating a Multiple Attack Vectors (MAV) graph based on the information collected in the Information Model and the one or more scan parameters;

    (g) launching one or more attacks based on the MAV graph to compromise the Network, wherein the one or more attacks can be one or more from a group comprising an automated social engineering attack, a communication link attack and a DPU exploit attack;

    (h) installing at least one slave agent on the compromised Network to perform the one or more attacks in a distributed manner;

    (i) performing a multi stage attack by using the at least one slave agent and the at least one master agent by repeating (b) (c) (d) (e) (f) (g) and (h); and

    (j) generating a report by the system, wherein the report contains details about the compromised Network and the vulnerabilities of the Network.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×