期刊文献+

基于数据格式支持机制的自动化渗透测试框架 被引量:3

Automatic penetration test framework based on unified data format mechanism
下载PDF
导出
摘要 Backtrack4是功能最全面的一款测试平台,但由于数据交换处理机制的缺失使得它难以胜任高效的测试需求.设计了相应的数据格式支持机制,并依此开发了一个渗透测试框架(PTF).该框架会自动使用有关的渗透测试工具进行信息探测、漏洞评估、报告生成.真实网络环境中的实验验证了PTF能高效完成自动化渗透测试,进而大幅提升了使用Backtrack4进行渗透测试的有效性. Backtrack4 is a highly evaluated penetration test platform.It contains large database of security tool collection up-to-date,but it can not work efficiently without data supporting.We propose a penetration test framework(PTF) with unified data format mechanism,which can accomplish penetration testing automatically and efficiently.Tools are used automatically for information detection,vulnerability assessment,and report createment.Real network experiments show that PTF can highly enhance the effectiveness of penetration test using Backtrack4.
出处 《中国科学院研究生院学报》 CAS CSCD 北大核心 2011年第5期676-683,共8页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家自然科学基金(607731359 07180076 0970140)资助
关键词 网络渗透测试 Backtrack4 自动化 数据格式支持 PDFL network penetration testing Backtrack4 automatic unified data format supportion PDFL
  • 相关文献

参考文献11

  • 1Offensive Security. BackTrack Linux [EB/OL]. [2010-08-05 ] http://www. backtrack-linux.org/.
  • 2Fyodor. The art of port scanning [ J/OL]. Phrack Magazine, 1997, 7 ( 51 ) : Article 11 [ 2010-08-05 ]. http : //nmap. org/nmap_doc. html.
  • 3Deraison R. The nessus attack scripting language reference guide [ EB/OL]. (2000) [ 2010-08-05 ] http://www. virtualblueness, net/ nasl. html.
  • 4McNab C. Network security assessment [ M]. O' Reilly Media, 200%.
  • 5Kwon O H, Lee S M, Lee H, et al. HackSim: An automation of penetration testing for remote buffer overflow vulnerabilities [ C ] //Information Networking - Convergence in Broadband and Mobile Networking-International Conference. 2005.
  • 6Lee J. Exploit Automation with the Metasploit Framework [ R]. BlackHat-DC-2010-Egypt, 2010.
  • 7Blyth A. An XML-based architecture to perform data integration and data unification in vulnerability assessments [ J]. Information Security Technical Report, 2003, 8 (4) : 14-25.
  • 8Open Information Systems Security Group. ISSAF [ S/OL]. [ 2010-08-05 ]. http://www, oissg, org/downloads/issaf/.
  • 9Pete Herzog. Open Source security testing methodology manual [ S/OL]. [ 2010-08-05 ]. http:ffwww, isecom, org/osstmm/.
  • 10InSecure. Nmap data standard [ S/OL]. [2010-08-05 ]. http://www, insecure, org/nmap/data/nmap, dtd.

同被引文献31

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部