VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework

Kankanok Vimala, S. Fugkeaw
{"title":"VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework","authors":"Kankanok Vimala, S. Fugkeaw","doi":"10.1109/KST53302.2022.9729085","DOIUrl":null,"url":null,"abstract":"Vulnerability assessment (VA) and penetration test (PenTest) are required by many organizations to satisfy their security auditing and compliance. VA and PenTest are conducted in the different stage and they are done through the software tools. Implementing the system that is able to convert the VA scan result to be rendered in the PenTest tool is a real challenge. This paper proposes a design and development of a system called VAPE-BRIDGE that provides the automatic conversion of the scan result of Open Vulnerability assessment scanner (OpenVAS) to be the exploitable scripts that will be executed in the Metasploit which is a widely-used opensource PenTest program. Specifically, the tool is designed to automatically extract the vulnerabilities listed in Open Web Application Security Project 10 (OWASP 10) and exploit them to be tested in the Metasploit. Our VAPE-BRIDGE encompasses three main components including (1) Scan Result Extraction responsible for extracting the VA scan results related to OWASP10 (2) Target List Repository responsible for retaining lists of vulnerabilities to be used in the process of Metasploit, and (3) Automated Shell Scripts Exploitation responsible for generating the script to render the exploit module to be executed in Metasploit. For the implementation, the VAPE-Bridge protype system was tested with a number of test cases in converting the scan results into shell code and rendering results to be tested in Metasploit. The experimental results showed that the system is functionally correct for all cases.","PeriodicalId":433638,"journal":{"name":"2022 14th International Conference on Knowledge and Smart Technology (KST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Knowledge and Smart Technology (KST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KST53302.2022.9729085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Vulnerability assessment (VA) and penetration test (PenTest) are required by many organizations to satisfy their security auditing and compliance. VA and PenTest are conducted in the different stage and they are done through the software tools. Implementing the system that is able to convert the VA scan result to be rendered in the PenTest tool is a real challenge. This paper proposes a design and development of a system called VAPE-BRIDGE that provides the automatic conversion of the scan result of Open Vulnerability assessment scanner (OpenVAS) to be the exploitable scripts that will be executed in the Metasploit which is a widely-used opensource PenTest program. Specifically, the tool is designed to automatically extract the vulnerabilities listed in Open Web Application Security Project 10 (OWASP 10) and exploit them to be tested in the Metasploit. Our VAPE-BRIDGE encompasses three main components including (1) Scan Result Extraction responsible for extracting the VA scan results related to OWASP10 (2) Target List Repository responsible for retaining lists of vulnerabilities to be used in the process of Metasploit, and (3) Automated Shell Scripts Exploitation responsible for generating the script to render the exploit module to be executed in Metasploit. For the implementation, the VAPE-Bridge protype system was tested with a number of test cases in converting the scan results into shell code and rendering results to be tested in Metasploit. The experimental results showed that the system is functionally correct for all cases.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
VAPE-BRIDGE:桥接OpenVAS结果用于自动化Metasploit框架
许多组织需要漏洞评估(VA)和渗透测试(PenTest)来满足其安全审计和遵从性。VA和PenTest是在不同的阶段进行的,它们是通过软件工具完成的。实现能够将VA扫描结果转换为在PenTest工具中呈现的系统是一个真正的挑战。本文设计并开发了一个名为VAPE-BRIDGE的系统,该系统将开放漏洞评估扫描器(Open Vulnerability assessment scanner, OpenVAS)的扫描结果自动转换为可被利用的脚本,并在广泛使用的开源测试程序Metasploit中执行。具体来说,该工具旨在自动提取开放Web应用程序安全项目10 (OWASP 10)中列出的漏洞,并利用它们在Metasploit中进行测试。我们的VAPE-BRIDGE包含三个主要组件,包括(1)扫描结果提取,负责提取与OWASP10相关的VA扫描结果;(2)目标列表存储库,负责保留在Metasploit过程中使用的漏洞列表;(3)自动Shell脚本开发,负责生成脚本,以呈现在Metasploit中执行的漏洞模块。为了实现VAPE-Bridge原型系统,在将扫描结果转换为shell代码和渲染结果以在Metasploit中进行测试时,使用了许多测试用例对其进行了测试。实验结果表明,该系统在所有情况下都是功能正确的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Unsupervised and Ensemble-based Anomaly Detection Method for Network Security Unsupervised concept identification from a large corpus of research documents GSAP: A Hybrid GRU and Self-Attention Based Model for Dual Medical NLP Tasks Beyond fear go viral: A machine learning study on infodemic detection during covid-19 pandemic Blockchain for Transport (BC4 T), Performance Simulations of Blockchain Network for Emission Monitoring
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1