Font Size: a A A

Research And Implementation Of Analysis And Assessment Of Vulnerability Based On Network Range

Posted on:2013-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:J Q MengFull Text:PDF
GTID:2298330422973966Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With constantly development of the computer network and communication today,the problem of network security become more and more concern. Different forms ofaggressive behavior can damage the network security seriously, mainly due to theinherent vulnerability in network system. Therefore, to deeply analyze and researchvulnerabilities of network system is greatly significant for safeguarding computernetwork.This paper focused on the researching of analysis and assessment of vulnerabilitybased on network rangeļ¼ŽBase on understanding the structure of network range andconcept and technology of vulnerability, to deeply research on vulnerability analysisand the key function module implementation of loading Nessus and Nmap onMetasploit, designed to provide a comprehensive and effective computer networkvulnerability analysis and assessment system, so that the relevant technical staff canfind and solve the potential vulnerability of the network system accurately and timely.The main contents are as follows.(1)Firstly, this paper brings the related work and the existing methods ofvulnerability analysis and assessment inland and abroad, and then introduces thestructure of existing network ranges and the related technology of Metasploit, Nessusand Nmap.(2)On the basis of the character of vulnerability in network and the desired rangeplatforms when building system, to deeply elaborate the structure of the new networkrange-YH rang. This paper brings the analysis and assessment of vulnerability systembased on Metasploit, Nmap and Nessus.(3)On the basis of the virtual experiment platform provided by YH range, thispaper brings the structure of the key function module, to combine the penetration testingtool Metasploit with the security scanning tool Nessus and Nmap, to elaboratecorresponding algorithm at the same time.(4)Making use of the above-mentioned research, this paper implemented therelated function of analysis and assessment of vulnerability, verifying its validity. Theexperiment shows that the proposed algorithm in this paper get better results than thepast. Based on the platform provided by YH range, making use of the open sourceframework of Metasploit, to load Nessus and Nmap on its structure, finally to loadsecurity scan in Metasploit Console and then call scan results.
Keywords/Search Tags:Vulnerability, Network range, Metasploit, Penetration testing, Nmap, Nessus
PDF Full Text Request
Related items