Using Artificial Intelligence & Machine Learning to solve serious cybersecurity issues in Continuous Threat Exposure Management, Automated Penetration Testing and Risk Management.
Visualized attack topology and attack path.
Overall attack situation and details of each attackAttack forensic, vulnerability fix and risk mitigationGlobal attack topology with five layers of information.
Drill down to the Risk to see the detailed attack path of each attack
Visualize the process of how a vulnerability is discovered and exploitedVulnerability discovery.
Vulnerability exploitationFive Layers of attack information: Attacker: RidgeBot®
Target: target IP
Attack surface: found open port
Vulnerability: vulnerability details with target info.
Risk: how the vulnerability is used to attack the target system.
Discover the attack surface for the targets and identify its attack mechanism details in the following categories:
URL: URL/Domain/method
Port: IP/App/Port/Service
Email: email address
Back-end login entries: URL/Domain/post data/method
File upload entries: URL/Domain/post data/method
Neighboring domain: URL/Domain/post data/method
Front-end entries: URL/Domain/post data/method
Show the details of each vulnerability including:
Vulnerability Type
Severity Rank
CVSS score/vector
Description
Fix Solution
Reference info
Details: payload etc
Attack snapshot
Attack snapshot:for HTTP request only now, not supported for socket, TCP or UDP
Vulnerability validation is to exploit the vulnerability to validate its existence.
HTTP reload is a typical validation method, its goal is to reload the HTTP request and get the result leveraging the vulnerability
Risk is the result of the vulnerability exploitation and defined as an exploit that accomplishes the whole kill-chain.
RidgeBot® 3.1 supports 4-type of risks:
Remote Command Execution
Credential disclosure
Sensitive information exposure
Database manipulation
Details of Remote Command Execution risk
Risk details: shell type/path, user, OS etc.
Terminal: a virtual machine to execute the remote command
File Manager: the file folder directory on the target system
Details of Database manipulations risk
Show how the database is manipulated by either Week password or SQL injection
Can retrieve and show details of the Database library and table as a result of the risk
Jointly exploit the vulnerabilities to find more risks
Vulnerability a + vulnerability b
Vulnerability a + new attack surface
Vulnerability a + other new information (credentials, privilege escalation)
The iterative attack/exploitation
A vul or risk result discovered from the previous step can be used again to exploit the system further.
E.g. leverage the authentication information obtained for further attacks.
Note: The iteration is for single target only, not for the lateral movement
Tincidunt sed amet ullamcorper diam. Diam proin magnis semper egestas in faucibus tristique augue. Nec tristique hac.
Dynamically update the attack tasks during a test
Add target, attack surface, vulnerability etc. during the attack process
The user can add their known vulnerabilities to the iterative tasks for a specific purpose or to improve the attack result.