Danar Cahyo Prakoso, Imam Riadi, Yudi Prayudi,
... information is confidential. Therefore, security is also essential. Metasploit is one of the frameworks commonly used by ... it does not rule out the possibility that Metasploit can also be used for crime. For this ... on Windows 10 will be carried out with Metasploit. Then the digital forensics process uses live forensics ...
Tópico(s): Security and Verification in Computing
2020 - Muhammadiyah University of Malang | Kinetik Game Technology Information System Computer Network Computing Electronics and Control
Indraneel Mukhopadhyay, Shilpam Goswami, Eshita Mandal,
... we have proposed a architecture using nesus and metasploit tool to do scan vulnerabilities of an website.
Tópico(s): Security and Verification in Computing
2014 - International Organization Of Scientific Research (IOSR) | IOSR Journal of Computer Engineering
Metasploit is a favourite tool of people wearing white hats, black hats and every shade in between. ...
Tópico(s): Network Security and Intrusion Detection
2013 - Elsevier BV | Network Security
... indicated that all samples of shellcode provided by Metasploit Framework, as well asthe 18 most recent attacks using Metasploit Framework, can be detected. Comparison of this method ...
Tópico(s): Network Security and Intrusion Detection
2015 - Elsevier BV | Procedia Computer Science
... pentest breach the Anti malware protection process.Using metasploit expoit ms08_067_netapi and meterpreter payload windows/ ...
Tópico(s): Advanced Malware Detection Techniques
2012 - International Organization Of Scientific Research (IOSR) | IOSR Journal of Computer Engineering
Abhishek Arote, Umakant Mandawkar,
... evaluating existing tools and exploits, and using the Metasploit framework for penetration testing and running exploits within ...
Tópico(s): Mobile and Web Applications
2021 - | International Journal of Scientific Research in Computer Science Engineering and Information Technology
Peter Teufl, Udo Payer, Guenter Lackner,
... the adopted framework to malicious code examples from Metasploit.
Tópico(s): Semantic Web and Ontologies
2010 - Springer Science+Business Media | Lecture notes in computer science
Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu,
... over a comprehensive set of shellcode collected from Metasploit and other polymorphic engines. Experimental results show that ...
Tópico(s): Spam and Phishing Detection
2012 - Hindawi Publishing Corporation | Security and Communication Networks
Miltiadis Kandias, Dimitris Gritzalis,
Tópico(s): Superconducting Materials and Applications
2012 - Elsevier BV | Computers & Security
Jarrod R. McClean, Christopher J. Stull, Charles R. Farrar, David Mascareñas,
... free cyber security penetration testing tools such as Metasploit?” This research focuses on applying common, low-cost, ...
Tópico(s): Advanced Malware Detection Techniques
2013 - SPIE | Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE
D. Raghu Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout,
... up the tunnels. This paper presents a new Metasploit module for integrated penetration testing of DNS tunnels ...
Tópico(s): Software Testing and Debugging Techniques
2013 - Springer Science+Business Media | Lecture notes in computer science
Dan Tao, Zhaowen Lin, Cheng Lü,
... module. We adopted the permeable automated testing tool Metasploit to perform security testing. In our test experiments, ...
Tópico(s): Software System Performance and Reliability
2015 - Tsinghua University Press | Tsinghua Science & Technology
Rajiv Kumar, Katlego Tlhagadikgora,
... GFI Languard and OpenVAS) and exploitation tools (Armitage, Metasploit framework) are used to simulate possible attacks.
Tópico(s): Information and Cyber Security
2018 - Springer Science+Business Media | Communications in computer and information science
Lim Kah Seng, Norafida Ithnin, Syed Zainudeen Mohd Said,
... vulnerability assessment.In the meanwhile, exploitation tools like Metasploit and WFuzz are created to compromise web application ...
Tópico(s): Advanced Malware Detection Techniques
2018 - | International Journal of Advanced Computer Research
Luís Rosa, Miguel Borges de Freitas, Sergey Mazo, Edmundo Monteiro, Tiago Cruz, Paulo Simoes,
... Wireshark dissector, a Nmap NSE PCOM scan, multiple Metasploit PCOM modules, a set of Snort PCOM rules, ...
Tópico(s): Security and Verification in Computing
2019 - Institute of Electrical and Electronics Engineers | IEEE Access
Ivan Homoliak, Martin Teknös, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanáček,
... means of a tool, based on NetEm and Metasploit, which implements our obfuscation operators on any TCP ...
Tópico(s): Advanced Malware Detection Techniques
2019 - Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | ICST Transactions on Security and Safety
Chunlai Du, Shenghui Liu, Lei Si, Yanhui Guo, Tong Jin,
... code execution vulnerability has been constructed under the Metasploit framework and used to evaluate the performance of ...
Tópico(s): Anomaly Detection Techniques and Applications
2020 - | Computers, materials & continua/Computers, materials & continua (Print)
Valdemar Švábenský, Jan Vykopal, Pavel Šeda, Pavel Čeleda,
... The commands were captured in Bash, ZSH, and Metasploit shells. The data are stored as JSON records, ...
Tópico(s): Software Engineering Research
2021 - Elsevier BV | Data in Brief
... tool that can automatically extract code protected by Metasploit’s polymorphic xor additive feedback encoder Shikata-Ga- ...
Tópico(s): Software Testing and Debugging Techniques
2014 - Springer Science+Business Media | Lecture notes in computer science
Ramiro Ramirez, Chun-Kai Chang, Shu-Hao Liang,
... is Kali ver. 2022.3, runs Nmap and Metasploit to exploit the target Modbus registers. On the ...
Tópico(s): Physical Unclonable Functions (PUFs) and Hardware Security
2023 - Multidisciplinary Digital Publishing Institute | Electronics
... This test will be done by using the Metasploit Framework.
Tópico(s): Mobile and Web Applications
2016 - | International Journal of Computer Applications
M. Faturrohman, Angelita Salsabila, Zulma Mardiah, Aqwam Rosadi Kardian,
Advances in information and communication technology encourage the development of operating systems. Windows 10 is one of the most widely used operating systems today. Unfortunately, there are still many who do not know that in the Windows 10 system there are several system vulnerabilities and some bugs. One example is the vulnerability in Server Message Block (SMB) on Windows 10 (CVE-2020-0796). This vulnerability exploits the Buffer Overflow method on one of the Execution Server Message Block (SMB) ...
Tópico(s): Environmental Engineering and Cultural Studies
2023 - Universitas Merdeka Malang | JEEMECS (Journal of Electrical Engineering Mechatronic and Computer Science)
Gianpiero Costantino, Ilaria Matteucci,
... inject CAN bus frames by means of a Metasploit module that we wrote.
Tópico(s): Autonomous Vehicle Technology and Safety
2022 - Springer Science+Business Media | Journal of Computer Virology and Hacking Techniques
Zian Liu, Chao Chen, Leo Yu Zhang, Shang Gao,
... Eternalblue in Wannacry, and the comparison with the Metasploit’s Eternalblue exploit are presented. The key finding ...
Tópico(s): Network Security and Intrusion Detection
2022 - Springer Science+Business Media | Lecture notes in computer science
Mandeep Singh, Sunny Kumar, Tushant Garg, Niranjan Pandey,
... perform a penetration test on Metasploitable 2 using Metasploit. Metasploitable 2 is a vulnerable system that we ... possible vulnerabilities in a system. By using the Metasploit system to test a system, we can find ... do penetration testing, but we decide to use Metasploit be-cause of its broad uses and simplicity. ... option of either using the command line within Metasploit or by using the community version of the ...
Tópico(s): Digital and Cyber Forensics
2020 - Engg Journals Publications | International Journal Of Engineering And Computer Science
Defend your network by attacking it. Armitage and Metasploit give you the same techniques skilled attackers use, ...
Tópico(s): Software Testing and Debugging Techniques
2011 - Belltown Media | Linux journal
... such as Distributed Denial-of-Service (DDoS) and metasploits have posed a major problem to the public ...
Tópico(s): Opportunistic and Delay-Tolerant Networks
2014 - Springer Science+Business Media | Lecture notes in electrical engineering
... network. The proposed penetration tool uses Nessus and Metasploit tool to find out the vulnerability of a ...
Tópico(s): Advanced Malware Detection Techniques
2018 - IOP Publishing | Journal of Physics Conference Series
Ibrahim Sadek, Penny Chong, Shafiq Ul Rehman, Yuval Elovici, Alexander Binder,
... Several obfuscated reverse remote shells were generated using Metasploit-Framework, Hyperion, and PEScrambler tools. After compromising the ...
Tópico(s): Network Security and Intrusion Detection
2019 - Elsevier BV | Data in Brief
Jaromír Janisch, Tomáš Pevný, Viliam Lisý,
... industry-level tools, such as Vagrant, VirtualBox, and Metasploit. Experiments demonstrate that a simulation-trained agent can ...
Tópico(s): Adversarial Robustness in Machine Learning
2024 - Springer Science+Business Media | Lecture notes in computer science