×

System and method for identifying exploitable weak points in a network

  • US 9,043,920 B2
  • Filed: 10/17/2012
  • Issued: 05/26/2015
  • Est. Priority Date: 06/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A system for identifying exploitable weak points in a network, comprising:

  • one or more passive scanners configured to observe one or more connections in the network to identify one or more network addresses and one or more open ports associated with the observed connections;

    one or more active scanners configured to scan the network to enumerate one or more current connections in the network and identify one or more network addresses and one or more open ports associated with the enumerated current connections in the network; and

    one or more hardware processors coupled to the one or more passive scanners and the one or more active scanners, wherein the one or more hardware processors are configured to;

    model trust relationships in the network based on information associated with the connections observed with the one or more passive scanners and the current connections enumerated with the one or more active scanners;

    identify exploitable weak points in the network based on the information associated with the connections observed with the one or more passive scanners and the current connections enumerated with the one or more active scanners, wherein the exploitable weak points include one or more hosts that have internally exploitable services, one or more hosts that have remotely exploitable services, one or more hosts that have exploitable client software, one or more hosts that have exploitable client software and connect to remote networks or process content from the remote networks, one or more destination hosts that accept exploitable trust relationships from internally exploitable source hosts, and one or more destination hosts that accept exploitable trust relationships from remotely exploitable source hosts;

    identify, among the network addresses and the open ports associated with the current connections enumerated with the one or more active scanners, network addresses having exploitable services that permit remote or uncredentialed checks, network addresses having exploitable services on one or more predetermined ports, and network addresses having remotely exploitable patch audits associated with a low access complexity rating;

    include the identified network addresses having one or more of the exploitable services that permit the remote or uncredentialed checks, the exploitable services on the one or more predetermined ports, or the remotely exploitable patch audits associated with the low access complexity rating among the hosts that have the internally exploitable services;

    simulate an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network; and

    enumerate one or more remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network based on the simulated attack.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×