期刊文献+

基于Metasploit和Armitage整合的图形化扫描渗透技术的实际应用

Practical Application of Graphical Scanning Osmosis Technology Based on Metasploit and Armitage Integration
下载PDF
导出
摘要 在创建好Kali,Linux2.0的前提下,去和Metasploit和Armitage进行融合。利用Armitage来使用Metasploit框架里的模块,并把之前所采用的Metasploit命令全部转化成图形的形式,并且扫描Armitage的工作结束以后,通过对扫描结果的了解情况,来融入合理的模块,这样一来就能够加强执行能力,从而很好的让渗透工作变得简单。另外,不仅能够让图形和命令这两个形界一同进行显示,同时还能够让Tabs区里的很多conseole随便进行转换。 In the premise of creating Kali and Linux2.0,we will merge with Metasploit and Armitage.Armitage to use the Metasploit framework of the module,and used Metasploit command all converted into the form of graphics,and scanning Armitage's work ended,through the understanding of the results of the scan to fit into the reasonable module,so It will be able to strengthen the implementation capacity,so that it is very easy to infiltrate the work.In addition,not only can the graphics and commands form the two bound together,but also allows many conseoles in the Tabs area casually Conversion.
作者 傅彬 FU Bin(Shaoxing Vocational and Technical College,Shaoxing Zhejiang 312000)
出处 《数字技术与应用》 2018年第1期86-87,共2页 Digital Technology & Application
基金 校级科研项目:基于Metasploit和Armitage整合的图形化扫描渗透技术的实现(SZK201602)
关键词 METASPLOIT Armitage 扫描 渗透 metasploit armitage scanning infiltration
  • 相关文献

参考文献3

二级参考文献32

  • 1Stuart McClure, Joel Scambray and George Kurtz. Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition[M]. New York, US. McGraw-Hill Osborne Media, 2012.66-79.
  • 2Shakeel Ali (Author), Tedi Heriyanto. BackTrack 4: Assuring Security by Penetration Testing[M]. Birmingham, UK: Packt Publishing, 2(111.37-38.
  • 3Network Security Services. Penetration test[EB/OL], http:// en.wikipedia.org/wiki/Network_Security_Services, 2012-04-16.
  • 4National Institute of Standards and Technology. Technical Guide to Information Security Testing and Assessment[EB/OL]. http://csrc.nist. gov/publications/mstpubs/800-115/SP800-115.pdf,2012-12-18.
  • 5Open Information Systems Security Group. Information Systems Security Assessment Framework[EB/OL]. http://www.oissg.org/ issaf,2012-12-15.
  • 6Institute for Security and Open Methodologies. The Open Source Security Testing Methodology Manual[EB/OL}. http://www.isecom.org/, 2012-12-01/2012-12-15.
  • 7IndianZ. OSSTMM Test[EB/OL]. http://www.indianz.ch/ offenseosstmm.html, 2012-12-12.
  • 8PTES. Penetration Testing Execution Standard[EB/OL]. http://www. pentest -standard.org/index.php/Main Page, 2012-12-14.
  • 9Immunity, Inc. Canvas[EB/OL]. http://www.immunitysec.com, 2012-12-01.
  • 10Core Security Technologies. Corelmpact[EB/OL]. http://www. coresecuriW.com/, 2012-12-01.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部