Test system based on metasploit framework and method to realize network security test

A technology for testing systems and frameworks, applied in the field of information security to simplify the configuration process

Active Publication Date: 2021-05-18
BEIJING INST OF COMP TECH & APPL
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is: how to solve the problem of composition and invocation of penetration attack tool resources in the test system in view of the test system construction requirements in network testing and countermeasure research and development, and propose a method based on Metasploit framework and penetration attack tool integration call Test system and method for realizing network security test by using the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Test system based on metasploit framework and method to realize network security test
  • Test system based on metasploit framework and method to realize network security test
  • Test system based on metasploit framework and method to realize network security test

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0035] The test system of the present invention includes a penetration attack module, an attack load module, an auxiliary tool module and a console module, and is realized by integrating open source products such as Metasploit and self-developed methods, and its hardware carrier can be a notebook, such as figure 1 shown.

[0036] Wherein, the penetration attack module is a collection of various penetration attack tools, and the concept of the penetration attack tool in the present invention corresponds to the exploit in Metasploit (which is designed by attackers or testers for the loopholes in the system to destroy the security of the system. Attack code), which is a vulnerability exploit tool running in the test compu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a testing system based on a Metasploit framework and a method for realizing network security testing, and relates to the technical field of information security. The present invention realizes the test process by calling the penetration attack tool in the Metasploit framework in batches; and verifies the test effect of the penetration attack tool by selecting a specific typical attack load and the combination of the penetration attack tool. Through the present invention, a test system for target computer vulnerabilities and network security equipment is constructed, and a large number of penetration attack tools and attack loads integrated in the Metasploit framework are used to realize the security test of the target network in combination with other related test tools.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a testing system based on a Metasploit framework and a method for realizing network security testing by using the system. Background technique [0002] With the continuous development of information technology, the information environment of the equipment in the Internet and various local area networks is becoming more and more complex. Active and passive attacks occur on the network every minute and every second, and the equipment in the network has to withstand the network Various attacks and illegal scans in the network, for such attacks, the security protection equipment in the network is currently used to protect the network, which puts forward higher requirements for the detection of abnormal data traffic on the network itself, in order to test the computer To determine the protection capabilities of security protection equipment in various attacks, it is neces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 常承伟施雪成贾琼曾淑娟吴明杰
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products