Abstract

At the current stage of technology development, information systems on a corporate scale are becoming more and more widespread. Corporate systems include a hierarchical set of services and services that are constantly subject to internal changes in the configuration of the software and hardware component of the entire complex. Among other things, the system may represent a concept of Internet Things, combining not only the main devices, but also additional devices to organize the convenience of the end user interaction. Such a complex is subject to constant threats from the point of view of information security due to the changes made, since the presence of an error even in a separate component can lead to the presence of a vulnerability that allows to get an unauthorized access to the whole system, and as a result — unauthorized access to information and management of the target object. To study such systems for vulnerabilities, it is proposed to develop an information product that would allow to automate the process of searching and exploitation of vulnerabilities in the whole network infrastructure and subsequent reporting on various criteria. The product under development is intended for the operating system of the Unix family and is intended for use on specialized operating systems such as Kali Linux, Parrot Sec, Nethunter, etc. Considering a corporate network segment, it is assumed to organize a search for vulnerabilities by introducing neutrally fuzzy algorithms that search for several parameters and, if successful, nested search in a particular segment. The Rapid7 vulnerability database is supposed to be used as the input data to perform fuzzy searches. This approach will allow to identify vulnerabilities both in a separate system interaction proto col and in the operating system of a separate object, which may be a switch or server. As a result, it is planned to obtain an automated management system for the Metasploit Framework through a web interface, allowing the information security specialist to quickly eliminate the identified vulnerabilities.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.