期刊文献+

基于metasploit和armitage整合的图形化扫描渗透技术实现 被引量:1

The Implementation of Graphical Scanning and Penetration Technology Based on the Integration of Metasploit and Armitage
下载PDF
导出
摘要 在Kali Linux2.0平台的基础上,实现了metasploit和armitage的无缝连接。通过在Armitage中调用Metasploit框架所装载的许多模块,将原来metasploit复杂的命令行扫描渗透模式转换为图形化模式,且在armitage扫描完成后可根据扫描结果自动匹配相应模块进行渗透,提高了执行效率,极大的简化了渗透过程。此外不但可以实现图形界面与命令行界面同步显示,而且可以实现Tabs区多个console实例随意切换。 Based on the Kali Linux2. 0 platform,the article achieves a seamless connection between metasploit and armitage. By using most of the metasploit framework modules in armitage,it changes the original metasploit's complex command-line mode to the graphical mode which can automatically match the appropriate modules for penetration according to the scan results. Finally the paper improves the efficiency and greatly simplifies the penetration process. Furthermore,the synchronized display between the graphical interface and the command-line interface can be archived,and the optionally switching between the multiple consoles of the tabs can be archived,too.
出处 《山西电子技术》 2016年第3期58-60,共3页 Shanxi Electronic Technology
关键词 METASPLOIT armitage 扫描 渗透 测试 metasploit armitage scan penetration test
  • 相关文献

参考文献6

二级参考文献26

  • 1David Kennedy,Jimo’Gorman,Devon Kearns,Mati Aharoni Metasploit The Penetration Tester’s Guide[M].北京:电子工业出版社.2012.
  • 2张小斌,严望佳计算机网络安全工具[M].北京:清华大学出版社.1995.5.
  • 3Cbris McNab,王景新网络安全评估[M].北京:中国电力出版社,2010.5.
  • 4Marcel Dekker. Security of the Internet [M].1997:vol 15.
  • 5WangJie,Zheng Xiao,Liu Ya bin.Complete role base ofinstrusion prevention system[J].Computer Engineering and Application, 2009, 45(09): 88-91.
  • 6B.V. Chess.Improving computer security using extending static checking[C].In 2002 IEEE Symposium on Security and Privacy, 2002, 160-173.
  • 7Stuart McClure, Joel Scambray and George Kurtz. Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition[M]. New York, US. McGraw-Hill Osborne Media, 2012.66-79.
  • 8Shakeel Ali (Author), Tedi Heriyanto. BackTrack 4: Assuring Security by Penetration Testing[M]. Birmingham, UK: Packt Publishing, 2(111.37-38.
  • 9Network Security Services. Penetration test[EB/OL], http:// en.wikipedia.org/wiki/Network_Security_Services, 2012-04-16.
  • 10National Institute of Standards and Technology. Technical Guide to Information Security Testing and Assessment[EB/OL]. http://csrc.nist. gov/publications/mstpubs/800-115/SP800-115.pdf,2012-12-18.

共引文献15

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部