期刊文献+

基于Metasploit加载Nessus的漏洞扫描技术实现 被引量:3

The Implementation of Vulnerability Scanning Technique based on Loading Nessus on Metasploit
下载PDF
导出
摘要 文章为了提高Metasploit对于漏洞探测的准确度,将在其框架内部加载Nessus模块,来帮助其完成更加有效的渗透测试。实验证明,在Metasploit Console界面能有效地加载Nessus进行策略扫描,并能查看其扫描结果。 In order to improve the accuracy of Metasploit vulnerability detection, we can load the Nessus module to help complete a more effective penetration testing within its framework. Modular design and experimental results show that can be loaded effectively in the Console interface, Metasploit, Nessus carried out the strategy of scanning, and can see its scan results.
出处 《信息网络安全》 2012年第8期185-187,共3页 Netinfo Security
基金 科技支撑计划[2012BAH38B-04] 国家863计划项目[2010AA012505 2011AA010702] 自然科学基金[60933005]
关键词 METASPLOIT 脆弱性 渗透测试 NESSUS metasploit vulnerability penetration testing nessus
  • 相关文献

参考文献8

  • 1陈铁明,蔡家楣,蒋融融,冯宪澄.基于插件的安全漏洞扫描系统设计[J].计算机工程与设计,2004,25(2):194-196. 被引量:14
  • 2David Kennedy,Jimo’Gorman,Devon Kearns,Mati Aharoni Metasploit The Penetration Tester’s Guide[M].北京:电子工业出版社.2012.
  • 3王兰佳,段海新,李星.基于动态模拟的多态Shellcode检测系统[J].计算机工程,2008,34(13):7-9. 被引量:2
  • 4张小斌,严望佳计算机网络安全工具[M].北京:清华大学出版社.1995.5.
  • 5Cbris McNab,王景新网络安全评估[M].北京:中国电力出版社,2010.5.
  • 6Marcel Dekker. Security of the Internet [M].1997:vol 15.
  • 7WangJie,Zheng Xiao,Liu Ya bin.Complete role base ofinstrusion prevention system[J].Computer Engineering and Application, 2009, 45(09): 88-91.
  • 8B.V. Chess.Improving computer security using extending static checking[C].In 2002 IEEE Symposium on Security and Privacy, 2002, 160-173.

二级参考文献7

  • 1樊k丰 林东.网络信息安全与PGP加密[M].北京:清华大学出版社,1998..
  • 2于明俭 陈向阳 方汉.Linux设计权威指南[M].北京:机械出版社,2000..
  • 3谭毓安.网络攻击防护编码设计[M].北京希望电子出版社,2002..
  • 4Szor P, Ferrie R Hunting for Metamorphic[C]//Proc. of the 11th Virus Bulletin Conference. Prague, Czech Republic: [s. n.], 2001.
  • 5Chinchani R, Berg E. A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows[C]//Proc. of International Symposium on Recent Advances in Intrusion Detection. Washington D. C., USA: [s. n.], 2005.
  • 6Polychronakis M, Anagnostakis K G, Markatos E E Network-level Polymorphic Shellcode Detection Using Emulation[C]//Proc. of International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment. Berlin, Germany: [s. n.], 2006.
  • 7Zhang Qinghua, Reeves D S, Ning E Analyzing Network Traffic to Detect Self-decrypting Exploit Code[C]//Proc. of ACM Symposium on Information, Computer and Communications Security. Singapore [s. n.], 2007.

共引文献14

同被引文献17

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部