Agentless Automation Model for Post Exploitation Penetration Testing

被引:3
作者
Maddala, Saraswati [1 ]
Patil, Sonali [1 ]
机构
[1] KJ Somaiya Coll Engn, Dept Informat Technol, Mumbai, Maharashtra, India
来源
INTELLIGENT COMPUTING, INFORMATION AND CONTROL SYSTEMS, ICICCS 2019 | 2020年 / 1039卷
关键词
Post exploitation; Agentless; Penetration testing; Exploit;
D O I
10.1007/978-3-030-30465-2_59
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a world where even the most mundane of tasks requires the intervention of the cyberspace, it is particularly important to be aware of the risks and vulnerabilities that come with cyberspace. This has led to the development of a field better referred to as vulnerability assessment and penetration testing (VAPT). There are multiple parts to perform penetration testing, in this paper we will be focusing on the Post Exploitation part. Post exploitation outlines the activities to perform in order to breach the security of a target system by leveraging a discovered exploit. In this paper we propose an agentless model for the automation of post exploitation activities, where agentless means that no third party software is required to be installed on the target machine.
引用
收藏
页码:529 / 539
页数:11
相关论文
共 12 条
[1]  
Al Shebli H. M. Z., 2018, 2018 IEEE LONG ISL S, P1, DOI DOI 10.1109/LISAT.2018.8378035
[2]  
Almubairik N.A., 2016, 2016 11 INT C INT TE
[3]  
Almubairik NA, 2016, INT CONF INTERNET, P413, DOI 10.1109/ICITST.2016.7856742
[4]   Penetration Testing in the IoT Age [J].
Chen, Chung-Kuan ;
Zhang, Zhi-Kai ;
Lee, Shan-Hsin ;
Shieh, Shiuhpyng .
COMPUTER, 2018, 51 (04) :82-85
[5]  
Goel J.N., 2016, 2016 INT C INN CHALL
[6]  
Husari G, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P1, DOI 10.1109/ISI.2018.8587343
[7]  
(lSC)2 Government Advisory Council Executive Writers Bureau, 2013, PEN TEST PROS CONS A
[8]  
Shinde P, 2016, ANNU IEEE IND CONF
[9]  
Stefinko Y, 2016, 2016 13TH INTERNATIONAL CONFERENCE ON MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE (TCSET), P488, DOI 10.1109/TCSET.2016.7452095
[10]  
Tetskyi Artem, 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), P402, DOI 10.1109/DESSERT.2018.8409167