Font Size: a A A

Network Penetration Testing Data Collection Fetching And Query Platform Design And Implementation

Posted on:2013-12-07Degree:MasterType:Thesis
Country:ChinaCandidate:B X ChouFull Text:PDF
GTID:2248330374986653Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The target must be scouted before the penetration test. The objective is to obtainthe host IP address, the operation system as well as the list of application of the target.Recently, the methods of scout work used wildly depend on single tool. According tothe intercomparison results, analysis, establish contact and the network topologicstructure, the penetration testers establish permeability strategy.However, penetrationtest is an iterative process, especially when the target is difficult to be attack,penetration testers face a huge challenge because of massive information must beanalyzed and screened.This thesis just aims at the issues mentioned above.To give the tester an inquiryplatform of the target information, the technology of acquisition the target informationis to be researched. The main substance is as follows.1. Research the acquisition technology of target information in penetrationtest.The information needed is obtained through some other indirect data sets.For that, this thesis defines the concept and the range of network penetrationdata set and analyzes the contents of target information in combination of theactual demand.This thesis also suggests the analysis of different data setsusing keyword extraction.The method is convenient to testers,at the sametime,it also improves accuracy of information.For data analysis and inquiry,how to acquire data set is a premise. The thesis analyzes the methods thatservers grab data sets use.Then it explains the proxy tunnel rotationtechnology based on persistent connection and the camouflage technologybase on pseudo-random sequence. According to these technologies,data setcan be captured efficiently and continually.2. Design and implement of the palform.Based on the research of relatedtechnologies,the details of how to design and realize Crawler-man andEagle-eye are described.Then the test results also are expounded.According to the definition and analysis of the penetration test data set,and the research and implement of related technologies,testers can make a better attackstrategies by research and realization of network penetration test data set because of agood platform for target information inquire which can assist testers to analyze thetarget.
Keywords/Search Tags:Internet penetration test, Network security, Information grab
PDF Full Text Request
Related items