IL270463B - Verifying success of compromising a network node during penetration testing of a networked system - Google Patents

Verifying success of compromising a network node during penetration testing of a networked system

Info

Publication number
IL270463B
IL270463B IL270463A IL27046319A IL270463B IL 270463 B IL270463 B IL 270463B IL 270463 A IL270463 A IL 270463A IL 27046319 A IL27046319 A IL 27046319A IL 270463 B IL270463 B IL 270463B
Authority
IL
Israel
Prior art keywords
compromising
network node
networked system
node during
penetration testing
Prior art date
Application number
IL270463A
Other languages
Hebrew (he)
Inventor
Gorodissky Boaz
Ashkenazi Adi
Segal Ronen
Original Assignee
XM Cyber Ltd
Gorodissky Boaz
Ashkenazi Adi
Segal Ronen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XM Cyber Ltd, Gorodissky Boaz, Ashkenazi Adi, Segal Ronen filed Critical XM Cyber Ltd
Publication of IL270463B publication Critical patent/IL270463B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/75Indicating network or usage conditions on the user display

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Technology Law (AREA)
  • Computer And Data Communications (AREA)
IL270463A 2017-05-25 2019-11-05 Verifying success of compromising a network node during penetration testing of a networked system IL270463B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201762510794P 2017-05-25 2017-05-25
PCT/IB2018/053671 WO2018215957A1 (en) 2017-05-25 2018-05-23 Verifying success of compromising a network node during penetration testing of a networked system

Publications (1)

Publication Number Publication Date
IL270463B true IL270463B (en) 2020-11-30

Family

ID=64396279

Family Applications (1)

Application Number Title Priority Date Filing Date
IL270463A IL270463B (en) 2017-05-25 2019-11-05 Verifying success of compromising a network node during penetration testing of a networked system

Country Status (4)

Country Link
EP (1) EP3619906A4 (en)
AU (1) AU2018273171B2 (en)
IL (1) IL270463B (en)
WO (1) WO2018215957A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021130933A1 (en) * 2019-12-25 2021-07-01 日本電気株式会社 Analysis device, analysis method, and non-transitory computer-readable medium in which analysis program is stored
CN113254029B (en) * 2020-12-30 2024-02-02 深圳怡化电脑股份有限公司 Peripheral interface setting method and device of terminal equipment and electronic equipment

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6918038B1 (en) * 1996-08-13 2005-07-12 Angel Secure Networks, Inc. System and method for installing an auditable secure network
EP2145281B1 (en) * 2007-04-12 2013-11-20 Core Sdi, Incorporated System, method and computer readable medium for providing network penetration testing
EP2462716B1 (en) * 2009-08-05 2019-10-09 Help/Systems, LLC System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy
CA2773461C (en) * 2009-09-08 2016-10-04 Core Sdi Incorporated System and method for probabilistic attack planning
CN102468985B (en) * 2010-11-01 2016-03-23 北京神州绿盟信息安全科技股份有限公司 The method and system of penetration testing is carried out for Network Security Device
CN106462709A (en) * 2014-01-27 2017-02-22 克洛诺斯赛博科技有限公司 Automated penetration testing device, method and system
US9571517B2 (en) * 2014-11-11 2017-02-14 Goldman, Sachs & Co. Synthetic cyber-risk model for vulnerability determination
US9710653B2 (en) * 2015-04-20 2017-07-18 SafeBreach Ltd. System and method for verifying malicious actions by utilizing virtualized elements
US10218735B2 (en) * 2015-06-30 2019-02-26 The Mitre Corporation Network attack simulation systems and methods

Also Published As

Publication number Publication date
WO2018215957A1 (en) 2018-11-29
AU2018273171A1 (en) 2019-12-05
AU2018273171B2 (en) 2020-06-25
EP3619906A4 (en) 2021-01-06
EP3619906A1 (en) 2020-03-11

Similar Documents

Publication Publication Date Title
IL268203B (en) Penetration testing of a networked system
SG11201906936UA (en) Method and apparatuses for communication between blockchain nodes
EP3678351A4 (en) Method and device for network resource deployment and assessment
EP3367617A4 (en) Method for obtaining target transmission path and network node
SG10202107770WA (en) Network authentication method and apparatus
SG11201808529SA (en) Method and apparatus for a network and device discovery
IL258312B (en) Method, wireless device and network node for measurement reporting resolution adaptation
EP3605373C0 (en) Authentication method for a client over a network
GB2561935B (en) A system for providing an end-to-end network
GB201801767D0 (en) Network testing
GB2565612B (en) Method and System for Updating a Whitelist at a Network Node
GB201820008D0 (en) A node testing method and apparatus for a blockchain system
PL3348009T3 (en) Method and device for enabling testing of a communication node
GB2573970B (en) System and method for detecting network topology
PL3266245T3 (en) A network node and a method therein for determining a mobility criterion
ZA201908410B (en) Wireless device, network node and methods therein for reporting a measurement
EP3098987A4 (en) Time slot synchronization training method for optical burst transport network node, node device and network
EP3669780C0 (en) Methods, devices and system for a compensated hearing test
ZA201607636B (en) A network node and a method therein for performing comp reception of a transmission from a wireless device
IL270463B (en) Verifying success of compromising a network node during penetration testing of a networked system
PT3509337T (en) A node and method for managing a packet data network connection
ZA201805892B (en) Network server deployment method and system
HK1246904A1 (en) Method of securing connected devices on a network
ZA201800200B (en) Ip address management method and apparatus,ip address anchor,and mobile node
PL3157283T3 (en) Test apparatus for a telecommunication network and method for testing a telecommunication network

Legal Events

Date Code Title Description
FF Patent granted