×

SYSTEM AND METHOD FOR IDENTIFYING EXPLOITABLE WEAK POINTS IN A NETWORK

  • US 20140007241A1
  • Filed: 10/17/2012
  • Published: 01/02/2014
  • Est. Priority Date: 06/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A system for identifying exploitable weak points in a network, comprising:

  • one or more passive scanners configured to observe connections in the network to identify network addresses and open ports associated with the observed connections;

    one or more active scanners configured to scan the network to enumerate current connections in the network and identify network addresses and open ports associated with the current connections in the network; and

    one or more processors coupled to the one or more passive scanners and the one or more active scanners, wherein the one or more processors are configured to;

    model trust relationships in the network based on information associated with the connections observed with the one or more passive scanners and the current connections enumerated with the one or more active scanners;

    identify exploitable weak points in the network based on the information associated with the connections observed with the one or more passive scanners and the current connections enumerated with the one or more active scanners;

    simulate an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network; and

    enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network based on the simulated attack.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×