Abstract
We propose an extensible exploit framework for automation of penetration testing (or pen-testing) without loss of safety and describe possible methods for sanitizing unreliable code in each part of the framework. The proposed framework plays a key role in implementing HackSim a pen-testing tool that remotely exploits known buffer-overflow vulnerabilities. Implementing our enhanced version of HackSim for Solaris and Windows systems, we show the advantages of our sanitized pen-testing tool in terms of safety compared with existing pen-testing tools and exploit frameworks. This work is stepping toward a systematic approach for substituting difficult parts of the labor-intensive pen-testing process.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Snyder, J.: How Vulnerable? Information Security Magazine (March 2003)
Herzog, P.: Open-Source Security Testing Methodology Manual(OSSTMM) 2.1, Institute for Security and Open Methodologies (2003)
Wood, B.J., Duggan, R.A.: Red Teaming of Advanced Information Assurance Concepts. In: DARPA Information Survivability Conference and Exposition (DISCEX), pp. 112–118 (2000)
Palmer, C.C.: Ethical Hacking. IBM Systems Journal 3, 769–780 (2001)
Wingfield, N.: It Takes a Hacker. Wall Street Journal (March 11 2002)
Skaggs, B., Blackburn, B., Manes, G., Shenoi, S.: Network Vulnerability Analysis. In: IEEE Midwest Symposium on Circuits and Systems, MWSCAS-2002 (2002)
UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes, The Last Stage of Delirium Research Group (2001), http://lsd-pl.net
Scambray, J., McClure, S., Kurtz, G.: Hacking Exposed, 2nd edn., pp. 319–321. McGraw Hill, Osborne (2001)
Aitel, D.: The Advantages of Block-Based Protocol Analysis for Security Testing (2002), http://www.immunitysec.com/resources-papers.shtml
CANVAS Homepage, http://www.immunitysec.com/products-canvas.shtml
CORE IMPACT Homepage, http://www.coresecurity.com
LibExploit Homepage, http://www.packetfactory.net/Projects/libexploit
Metasploit Homepage, http://www.metasploit.com
Common Vulnerabilities and Exposures Homepage, http://www.cve.mitre.org
The 20 Most Critical Internet Security Vulnerabilities, Version 4.0 (October 8 2003), http://www.sans.org/top20
Koziol, J., Aitel, D., Litchfield, D., Anley, C., Eren, S., Mehta, N., Hassell, R.: The Shellcoder’s Handbook Discovering and Exploiting Security Holes, pp. 49–53. Wiley Publishing, Inc., Chichester (1997)
Win32 Assembly Components, The Last Stage of Delirium Research Group (2002), http://lsd-pl.net
LASSS Vulnerability, http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx
TruSecure Homepage, http://www.trusecure.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwon, OH. et al. (2005). HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities. In: Kim, C. (eds) Information Networking. Convergence in Broadband and Mobile Networking. ICOIN 2005. Lecture Notes in Computer Science, vol 3391. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30582-8_68
Download citation
DOI: https://doi.org/10.1007/978-3-540-30582-8_68
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24467-7
Online ISBN: 978-3-540-30582-8
eBook Packages: Computer ScienceComputer Science (R0)