论文标题

调查进攻信息安全工具的生态系统

Investigating the Ecosystem of Offensive Information Security Tools

论文作者

Anton, Simon D Duque, Fraunholz, Daniel, Schneider, Daniel

论文摘要

互联网格局正在增长,同时越来越多。服务是通过计算机和网络执行的,关键数据将数字存储。这为用户提供了自由,并为操作员提供了灵活性。数据更容易管理和分发。但是,连接到网络的每个设备都可能受到网络攻击的影响。安全解决方案(例如防病毒软件或防火墙)已被广泛建立。但是,仅凭防御措施就无法防止某些类型的攻击。进攻安全描述了使用网络罪犯的方法和工具的安全专业人员的实践。这使他们能够在成为真正攻击的入境点之前找到漏洞。此外,遵循网络犯罪分子的方法使安全专业人员能够适应犯罪分子的观点,并可能发现以前被忽略的攻击角度。由于网络犯罪分子经常采用免费的安全工具,因此了解这些工具为专业人员提供了更多的见解。这项工作对有关可维护性,可用性和技术细节的指标进行了分类和比较。通常,对于第一阶段,有几种公认的工具可用,而最初违规后的阶段缺乏各种工具。

The internet landscape is growing and at the same time becoming more heterogeneous. Services are performed via computers and networks, critical data is stored digitally. This enables freedom for the user, and flexibility for operators. Data is easier to manage and distribute. However, every device connected to a network is potentially susceptible to cyber attacks. Security solutions, such as antivirus software or firewalls, are widely established. However, certain types of attacks cannot be prevented with defensive measures alone. Offensive security describes the practice of security professionals using methods and tools of cyber criminals. This allows them to find vulnerabilities before they become the point of entry in a real attack. Furthermore, following the methods of cyber criminals enables security professionals to adapt to a criminal's point of view and potentially discover attack angles formerly ignored. As cyber criminals often employ freely available security tools, having knowledge about these provides additional insight for professionals. This work categorises and compares tools regarding metrics concerning maintainability, usability and technical details. Generally, several well-established tools are available for the first phases, while phases after the initial breach lack a variety of tools.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源