Unlock instant, AI-driven research and patent intelligence for your innovation.

Penetration testing method based on BackTrack

A technology of penetration testing and reconnaissance, which is applied to electrical components, transmission systems, platform integrity maintenance, etc., can solve problems such as the complexity of penetration testing technology, and achieve strong operability

Inactive Publication Date: 2013-11-20
GUANGZHOU UNIVERSITY
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the relatively complicated technical problems of the existing penetration testing technology, the present invention provides a penetration testing method based on BackTRack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Penetration testing method based on BackTrack
  • Penetration testing method based on BackTrack
  • Penetration testing method based on BackTrack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The penetration testing method based on the BackTrack platform provided by the present invention divides the penetration testing into five concise methods, namely reconnaissance, scanning, loophole utilization, maintenance access and report generation. A mature methodology is of great benefit to the work of penetration testing. There are many testing methodologies popular in the field of penetration testing, each with its own characteristics, but most of them are relatively complicated. The present invention proposes an easy-to-learn and The applied 5-step method of penetration testing based on the BackTrack system is mainly: reconnaissance, scanning, vulnerability exploitation, maintaining access and generating reports.

[0025] The specific implementation method is as follows:

[0026] Step 1, the reconnaissance phase. It is divided into active reconnaissance and passive reconnaissance, and finally aims to obtain information such as the IP address table of the target...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a penetration testing method based on BackTrack. The method includes the steps of firstly, obtaining information such as the IP address list of a target system and the like through the reconnaissance method; secondly, obtaining a survival list, a port mapping table and a loophole list of the target through the scanning method; thirdly, achieving the function of invading the target system through certain available loopholes; fourthly, keeping accessing a target host which is successfully attacked; finally, enabling the content in the accessed target host to be formed into a qualified penetration testing report. The penetration testing method based on BackTrack solves the technical problem that an existing penetration testing technology is complex and has the advantages of being simple, clear, easy to use, strong in operability, and the like.

Description

technical field [0001] The invention relates to a penetration testing method, in particular to a BackTrack-based penetration testing method. Background technique [0002] Penetration Testing, sometimes referred to as PenTest, is a set of processes used for core security assessment and auditing. It is a legal and authorized method of locating computer systems and successfully implementing vulnerability attacks on them. is to make these systems under test more secure. Since there is no very clear standard for penetration testing, the method of penetration testing depends on the level and habits of the tester, or some methods developed by some security agencies. Such as the NIST SP800-11) guidance document published by the National Institute of Standards and Technology, which presents a penetration testing methodology consisting of planning, mining, attacking, and reporting. [0003] There is also the Information System Security Assessment Framework (ISSAF), which is an open ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57H04L29/06H04L29/12
Inventor 谢冬青欧家权
Owner GUANGZHOU UNIVERSITY