By Ansh (Mentor: Dr. Thomas Heverin)
✅ Yes. Let's use Ontologies.
Ontologies are a way to represent information (usually in the form of graphs). Each node of the graph represents an entity and each line represents a relation between different entities.
Alt. Ontologies are formal representations of concepts, relations, and individuals in a graphical manner.
Ethical Hacking is the practice of emulating a malicious actor and penetrating systems, servers, or hosts with the intention of finding new vulnerabilities and patching them.
Information used to Hack WebCTRL 6.5 running on the BACnet Protocol
SELECT ?CVE ?AttackVector ?AttackComplexity
WHERE {
?CVE ics:AttackComplexity ?AttackComplexity .
?CVE ics:AttackVector ?AttackVector .
FILTER(?AttackVector = "Network" && ?AttackComplexity = "Low")
}
SELECT ?Vulnerability ?Exploit_Name ?Function
WHERE {
?Software ics:hasVulnerability ?Vulnerability .
?Software ics:hasFunction ?Function .
?Vulnerability ics:isExploitedBy ?Exploit .
?Exploit ics:exploitName ?Exploit_Name .
}
ORDER BY ?Function DESC(?Vulnerability)
Which vulnerabilities have 'Low' Attack Complexity and can be hacked across networks?
Display the name of exploits for vulnerabilities and what functions could be impacted in the network.