基于metasploit的滲透測試與攻擊方法的研究
[Abstract]:With the improvement of network security technology, hacker attack technology will be further improved. According to the official annual survey, the frequency of cyber attacks is increasing and the economic losses are increasing. Therefore, the security of network information is concerned all over the world in order to prevent irreparable loss caused by information leakage, and checking the security of the system has become an indispensable part of protecting the information security. Penetration testing is a way to obtain authorization and reasonably detect the security of the target system. Through this way, the security of the target system can be obtained scientifically. Mainstream penetration testing tools have metasploit framework, metasploit framework has good compatibility, scalability and automation performance. The escape technology uses various ways to avoid the network intrusion detection system and secretly sends the attack data stream to the target system. The combination of the two methods can detect the security of the target system more effectively. The mainstream escape workers have a fagroute,fagroute framework that contains most of the atomic escape modes found so far. At present, there is no mature standard and scheme to test network protective equipment in the market. In this paper, using open source metasploit and fragroute to create a scheme and equipment instrument which can effectively test network protective equipment in China. This paper describes the current research status of penetration testing and escape technology at home and abroad, selects Metasploit penetration test framework and fragroute module as the platform, and deeply analyzes the bottom function module and fragroute code of Metasploit penetration framework. This paper comprehensively analyzes and studies the main technical means of vulnerability mining, then extends the Metasploit penetration test framework and the fragroute module, and then loads the escape to test the attack, and completes the penetration module. Escape module attack success rate detection. The network protection equipment is tested by using the device instrument with the attack mode of escape technology. The results show that the network protection equipment can be effectively tested.
【學(xué)位授予單位】:華北電力大學(xué)(北京)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前4條
1 杜紅亮;王清賢;吳灝;;基于Windows的C++異常處理機(jī)制研究[J];信息工程大學(xué)學(xué)報(bào);2010年03期
2 姜千;胡亮;趙闊;努爾布力;王程明;;入侵檢測系統(tǒng)評(píng)估技術(shù)研究[J];吉林大學(xué)學(xué)報(bào)(信息科學(xué)版);2009年04期
3 徐有福;張晉含;文偉平;;Windows安全之SEH安全機(jī)制分析[J];信息網(wǎng)絡(luò)安全;2009年05期
4 王自亮,羅守山,楊義先;入侵檢測系統(tǒng)的測試與評(píng)估[J];中國數(shù)據(jù)通信;2002年11期
相關(guān)碩士學(xué)位論文 前10條
1 韓星;針對(duì)MAC層協(xié)議FUZZING測試技術(shù)的研究[D];北京郵電大學(xué);2013年
2 陳景峰;基于Fuzzing技術(shù)的WEB應(yīng)用程序漏洞挖掘技術(shù)研究[D];北方工業(yè)大學(xué);2012年
3 虞霞;基于攻擊樹和模糊層次分析法的網(wǎng)絡(luò)攻擊決策研究[D];重慶大學(xué);2010年
4 劉橋;入侵檢測系統(tǒng)測試評(píng)估的方法研究[D];湖北工業(yè)大學(xué);2010年
5 蒲石;Web安全滲透測試研究[D];西安電子科技大學(xué);2010年
6 王穎;Fuzzing漏洞挖掘與溢出利用分析技術(shù)研究[D];解放軍信息工程大學(xué);2009年
7 胡文濤;基于Fuzzing的網(wǎng)絡(luò)服務(wù)型軟件的漏洞挖掘研究[D];上海交通大學(xué);2009年
8 胡晗翰;Win32下緩沖區(qū)溢出漏洞利用技術(shù)的分析和改進(jìn)[D];華中科技大學(xué);2008年
9 許正強(qiáng);網(wǎng)絡(luò)信息安全滲透測試平臺(tái)研究[D];廣東工業(yè)大學(xué);2008年
10 王建國;基于緩沖區(qū)溢出的攻擊技術(shù)及防御策略研究[D];上海交通大學(xué);2008年
,本文編號(hào):2461951
本文鏈接:http://www.wukwdryxk.cn/guanlilunwen/ydhl/2461951.html