Design and Implementation of Automatic Web-Pages Penetration Testing System

碩士 === 國立臺灣科技大學 === 資訊管理系 === 100 === Internet has become part of life for most of people nowadays. More and more computer breach incidents make people aware of information security. While hackers keep improving their techniques to attack, protecting digital information and system has become extreme...

Full description

Bibliographic Details
Main Authors: Hsin-Tien Tseng, 曾信田
Other Authors: Tzong-Chen Wu
Format: Others
Language:zh-TW
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/17829243528207047407
Description
Summary:碩士 === 國立臺灣科技大學 === 資訊管理系 === 100 === Internet has become part of life for most of people nowadays. More and more computer breach incidents make people aware of information security. While hackers keep improving their techniques to attack, protecting digital information and system has become extremely critical issues for everyone. In order to secure network environment, computer security auditing is usually baseline protection for many enterprises. From technical perspective, penetration testing is the most effective approach among these auditing processes and methodologies. Penetration testing is one of highly technical approach to inspect and guarantee security for your network environment. Usually, penetration testing is performed by third party's professional service. Trusted security experts will simulate attacks to target systems in order to discover potential vulnerabilities and evaluate enterprise security risks. This paper proposes a distributed architecture and methodology to improve performance of penetration testing and try to solve the overloading problem of attacking system. We deploy attack agents to different places in the network. The system will provide a web interface for penetration testers. By issuing command from UI, system will automatically dispatch attack commands to distributed agents and these agents will perform attacks against different targets at the same time. Based on this design, the process loading could be shared and it also solved the problem of performance bottleneck on attack server. This design could also help the large scale penetration testing across different area/branches for large enterprises, with agent deployment, network traffic could be minimized. After performing the attacks, system will collect logs and results from agents, and produce well-formatted report.