×

SYSTEMS AND METHODS FOR DETECTING COMPUTER VULNERABILITIES THAT ARE TRIGGERED BY EVENTS

  • US 20180219909A1
  • Filed: 03/29/2018
  • Published: 08/02/2018
  • Est. Priority Date: 01/30/2017
  • Status: Active Grant
First Claim
Patent Images

1. ) A method for discovering and reporting a security vulnerability of a networked system by a penetration testing system, the networked system comprising a plurality of network nodes interconnected by one or more networks, wherein the penetration testing system comprises (i) a reconnaissance agent software module, that (A) can be installed on one or more network nodes of the plurality of network nodes, and (B) when installed on a network node of the plurality of network nodes, is operable to detect at least some free events occurring in the network node on which it is installed and to transmit data about occurrences of the at least some free events to a remote computing device, and (ii) a penetration testing software module installed on the remote computing device and operable to communicate with at least one of the plurality of network nodes on which the reconnaissance agent software module is installed, the method comprising:

  • a) receiving, by the penetration testing software module installed on the remote computing device, a message from a first network node on which the reconnaissance agent software module is installed, the message notifying the remote computing device of a specific occurrence of a specific free event in the first network node, wherein the message originates from the reconnaissance agent software module installed on the first network node, and wherein the specific free event is one of;

    i) sending a network message out of the first network node caused by a command from a user of the first network node;

    ii) sending a network message out of the first network node caused by an operating system of the first network node;

    iii) sending a network message out of the first network node caused by a software application installed on the first network node;

    iv) mounting a storage volume onto the first network node; and

    v) physically attaching a physical device to the first network node;

    b) identifying, by the penetration testing software module and based on the received message, a specific opportunistic vulnerability with which the specific free event is associated, wherein the identifying of the specific opportunistic vulnerability comprises;

    i) identifying a method for an attacker to compromise the first network node, andii) identifying that the method to compromise would be available to the attacker at or after a future occurrence of the specific free event in the first network node; and

    c) reporting, by the penetration testing system, the specific opportunistic vulnerability, wherein the reporting comprises at least one of;

    (i) causing a display device to display a report including information about the specific opportunistic vulnerability, (ii) storing the report including information about the specific opportunistic vulnerability in a file, and (iii) electronically transmitting the report including information about the specific opportunistic vulnerability.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×