Agentless Automation Model for Post Exploitation Penetration Testing

被引:3
|
作者
Maddala, Saraswati [1 ]
Patil, Sonali [1 ]
机构
[1] KJ Somaiya Coll Engn, Dept Informat Technol, Mumbai, Maharashtra, India
关键词
Post exploitation; Agentless; Penetration testing; Exploit;
D O I
10.1007/978-3-030-30465-2_59
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a world where even the most mundane of tasks requires the intervention of the cyberspace, it is particularly important to be aware of the risks and vulnerabilities that come with cyberspace. This has led to the development of a field better referred to as vulnerability assessment and penetration testing (VAPT). There are multiple parts to perform penetration testing, in this paper we will be focusing on the Post Exploitation part. Post exploitation outlines the activities to perform in order to breach the security of a target system by leveraging a discovered exploit. In this paper we propose an agentless model for the automation of post exploitation activities, where agentless means that no third party software is required to be installed on the target machine.
引用
收藏
页码:529 / 539
页数:11
相关论文
共 50 条
  • [21] Automated Post-Breach Penetration Testing through Reinforcement Learning
    Chaudhary, Sujita
    O'Brien, Austin
    Xu, Shengjie
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [22] An Automated Post-Exploitation Model for Cyber Red Teaming
    Benito, Ryan
    Shaffer, Alan
    Singh, Gurminder
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 25 - 34
  • [23] PENETRATION TESTING
    Aitkhozhayeva, Y. Zh.
    Ziro, A. A.
    Zhaibergenova, Zh. A.
    Baltabay, A. G.
    BULLETIN OF THE NATIONAL ACADEMY OF SCIENCES OF THE REPUBLIC OF KAZAKHSTAN, 2018, (06): : 39 - 44
  • [24] One evaluation of model-based testing and its automation
    Pretschner, A
    Prenninger, W
    Wagner, S
    Kühnel, C
    Baumgartner, M
    Sostawa, B
    Zölch, R
    Stauner, T
    ICSE 05: 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2005, : 392 - 401
  • [25] Simple Numerical Model to Simulate Penetration Testing in Unsaturated Soils
    Jarast, Pegah S.
    Ghayoomi, Majid
    3RD EUROPEAN CONFERENCE ON UNSATURATED SOILS - E-UNSAT 2016, 2016, 9
  • [26] A Research of Behavior-Based Penetration Testing Model Of The Network
    Wang LanFang
    Kou HaiZhou
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 1680 - 1683
  • [27] Mobile cloud computing applications penetration testing model design
    Al-Ahmad A.S.
    Aljunid S.A.
    Ismail N.K.
    International Journal of Information and Computer Security, 2020, 13 (02) : 210 - 226
  • [28] Automation of vulcanizate testing
    Haas, G
    Heinz, M
    Winkler, KW
    KAUTSCHUK GUMMI KUNSTSTOFFE, 1996, 49 (05): : 367 - 370
  • [29] Automation of vulcanizate testing
    Haas, G.
    Heinz, M.
    Winkler, K.-W.
    Kautschuk und Gummi, Kunststoffe, 1996, 49 (05): : 367 - 370
  • [30] MATERIALS TESTING AND AUTOMATION
    COOPER, WD
    ZWEIGORON, RB
    JOURNAL OF METALS, 1980, 32 (07): : 17 - 21