Abstract: The present invention relates to methods, network devices, and machine-readable media for an integrated environment for a method of environment security validation through controlled computer network exploitation. A set of parameters is received from an operator over the network. Based on these parameters an attack campaign is performed on the environment. In the course of the campaign, vulnerable hardware and software in the attacked network are identified. In another scenario, vulnerable hardware and software are mitigated until vendors provide official patches.
Type:
Application
Filed:
January 9, 2018
Publication date:
August 2, 2018
Applicant:
SMFPS, Inc.
Inventors:
Bryson Bort, Ateeq Sharfuddin, Robert W. Winchester-Mauck, Benjamin L. Dagana, Larry M. White, Christopher M. Balles, Tiffany Williams, Tommy Chin, Sean McConnell