{"title":"VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework","authors":"Kankanok Vimala, S. Fugkeaw","doi":"10.1109/KST53302.2022.9729085","DOIUrl":null,"url":null,"abstract":"Vulnerability assessment (VA) and penetration test (PenTest) are required by many organizations to satisfy their security auditing and compliance. VA and PenTest are conducted in the different stage and they are done through the software tools. Implementing the system that is able to convert the VA scan result to be rendered in the PenTest tool is a real challenge. This paper proposes a design and development of a system called VAPE-BRIDGE that provides the automatic conversion of the scan result of Open Vulnerability assessment scanner (OpenVAS) to be the exploitable scripts that will be executed in the Metasploit which is a widely-used opensource PenTest program. Specifically, the tool is designed to automatically extract the vulnerabilities listed in Open Web Application Security Project 10 (OWASP 10) and exploit them to be tested in the Metasploit. Our VAPE-BRIDGE encompasses three main components including (1) Scan Result Extraction responsible for extracting the VA scan results related to OWASP10 (2) Target List Repository responsible for retaining lists of vulnerabilities to be used in the process of Metasploit, and (3) Automated Shell Scripts Exploitation responsible for generating the script to render the exploit module to be executed in Metasploit. For the implementation, the VAPE-Bridge protype system was tested with a number of test cases in converting the scan results into shell code and rendering results to be tested in Metasploit. The experimental results showed that the system is functionally correct for all cases.","PeriodicalId":433638,"journal":{"name":"2022 14th International Conference on Knowledge and Smart Technology (KST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Knowledge and Smart Technology (KST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KST53302.2022.9729085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Vulnerability assessment (VA) and penetration test (PenTest) are required by many organizations to satisfy their security auditing and compliance. VA and PenTest are conducted in the different stage and they are done through the software tools. Implementing the system that is able to convert the VA scan result to be rendered in the PenTest tool is a real challenge. This paper proposes a design and development of a system called VAPE-BRIDGE that provides the automatic conversion of the scan result of Open Vulnerability assessment scanner (OpenVAS) to be the exploitable scripts that will be executed in the Metasploit which is a widely-used opensource PenTest program. Specifically, the tool is designed to automatically extract the vulnerabilities listed in Open Web Application Security Project 10 (OWASP 10) and exploit them to be tested in the Metasploit. Our VAPE-BRIDGE encompasses three main components including (1) Scan Result Extraction responsible for extracting the VA scan results related to OWASP10 (2) Target List Repository responsible for retaining lists of vulnerabilities to be used in the process of Metasploit, and (3) Automated Shell Scripts Exploitation responsible for generating the script to render the exploit module to be executed in Metasploit. For the implementation, the VAPE-Bridge protype system was tested with a number of test cases in converting the scan results into shell code and rendering results to be tested in Metasploit. The experimental results showed that the system is functionally correct for all cases.