Automated wireless vulnerability assessment using hand-held wireless devices
First Claim
1. A method for assessing network vulnerabilities for a secure target wireless network, comprising:
- attempting to access the secure target wireless network via one or more wireless access points that provide access to the secure target wireless network with a hand-held wireless device;
recovering a plurality of individual commonly-used authentication passwords from a list of commonly-used authentication passwords stored in the hand-held wireless device;
automatically applying, with the hand-held wireless device programmed to employ common authentication protocols, each of the plurality of individual commonly-used authentication passwords to attempt to connect to the secure target wireless network via the one or more wireless access points;
automatically scanning the secure target wireless network with the hand-held wireless device to collect data on the secure target wireless network;
collecting information, with the hand-held wireless device, regarding relative signal strengths of signals from the one or more wireless access points;
storing the collected data and the collected information regarding the relative signal strengths in the hand-held wireless device;
analyzing the stored data and the stored information to produce an assessment of a vulnerability of the secure target wireless network to intrusion; and
outputting the results of the analysis in a usable format for a user,the hand-held wireless device being programmed to autonomously undertake all of the attempting to access, recovering, automatically applying, automatically scanning, collecting, storing, analyzing and outputting.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are provided for employing a hand-held wireless device to assess a vulnerability of a wirelessly-accessible target network to intrusion and/or cyber-attack. The system and method are directed at providing discrete, covert and fully-automated wireless access to the target network via one or more wireless access points and to assessing characteristic of the one or more wireless access points and the target network in support of a vulnerability assessment. The hand-held wireless device is configured to collect appropriate data regarding the wirelessly-accessible network, including network and portal scans, and higher-level programmed data collection. The hand-held wireless device is further configured to analyze the collected data and to produce at least a first level vulnerability assessment of the target network without interaction by the user.
26 Citations
17 Claims
-
1. A method for assessing network vulnerabilities for a secure target wireless network, comprising:
-
attempting to access the secure target wireless network via one or more wireless access points that provide access to the secure target wireless network with a hand-held wireless device; recovering a plurality of individual commonly-used authentication passwords from a list of commonly-used authentication passwords stored in the hand-held wireless device; automatically applying, with the hand-held wireless device programmed to employ common authentication protocols, each of the plurality of individual commonly-used authentication passwords to attempt to connect to the secure target wireless network via the one or more wireless access points; automatically scanning the secure target wireless network with the hand-held wireless device to collect data on the secure target wireless network; collecting information, with the hand-held wireless device, regarding relative signal strengths of signals from the one or more wireless access points; storing the collected data and the collected information regarding the relative signal strengths in the hand-held wireless device; analyzing the stored data and the stored information to produce an assessment of a vulnerability of the secure target wireless network to intrusion; and outputting the results of the analysis in a usable format for a user, the hand-held wireless device being programmed to autonomously undertake all of the attempting to access, recovering, automatically applying, automatically scanning, collecting, storing, analyzing and outputting. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A hand-held wireless device for assessing network vulnerabilities for a secure target wireless network, comprising:
-
an external data communication interface configured as a receiver for receiving wireless signals passively from one or more wireless access points that provide access to one or more secure target wireless networks; a storage device that stores a list of commonly-used authentication passwords; a processor that is programmed to (1) direct a process for automatically scanning the one or more secure target wireless networks with the hand-held wireless device, (2) recover a plurality of individual commonly-used authentication passwords from the store list of commonly-used authentication passwords, (3) direct automatic attempts to connect via the one or more wireless access points using common authentication protocols, each of the plurality commonly-used authentication passwords being automatically applied in the automatic attempts to connect to the secure target wireless network via the one or more wireless access points, (4) collect data on at least one of the one or more wireless access points and the one or more secure target wireless networks to support a vulnerability assessment of the one or more secure target wireless networks to intrusion, (5) collect information regarding relative signal strengths of signals from the one or more wireless access points, (6) store the collected data and the collected information regarding relative signal strengths in the storage device, and (7) analyze the stored collected data and the stored collected information to produce the vulnerability assessment for the one or more secure target wireless networks; and an output device that outputs a result of the vulnerability assessment to a user of the hand-held wireless device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium storing instructions which, when executed by a processor in a hand-held wireless device, cause the processor to execute a method for assessing network vulnerabilities for a secure target wireless network, comprising:
-
attempting to access the secure target wireless network via one or more wireless access points that provide access to the secure target wireless network with a hand-held wireless device; recovering a plurality of individual commonly-used authentication passwords from a list of commonly-used authentication passwords stored in the hand-held wireless device; automatically applying each of the plurality of individual commonly-used authentication passwords to attempt to connect to the secure target wireless network via the one or more wireless access points; automatically scanning the secure target wireless network with the hand-held wireless device to collect data on the secure target wireless network; collecting information regarding relative signal strengths of signals from the one or more wireless access points; storing the collected data and the collected information regarding the relative signal strengths in the hand-held wireless device; analyzing the stored data and the stored information to produce an assessment of a vulnerability of the secure target wireless network to intrusion; and outputting results of the analysis in a usable format for a user.
-
Specification