skip to main content
10.1145/2801948.2802001acmotherconferencesArticle/Chapter ViewAbstractPublication PagespciConference Proceedingsconference-collections
research-article

An automated network intrusion process and countermeasures

Published:01 October 2015Publication History

ABSTRACT

This paper presents a case study in an attempt to raise awareness on computer security. Our research showed that theoretically one could indeed build a tool capable of automating a hacking attack, functional under certain circumstances. In this work, we first discuss the fundamental concepts of a penetration testing process and afterwards we highlight a number of open source tools, frameworks and programming languages used to build an automated process (Nmap, Metasploit, Python). Then, we demonstrate how those three technologies/tools can be combined to automate the intrusion process and create a script, allowing an attacker to access a single or multiple remote systems by only typing a single command. Finally, we present some countermeasures. Overall, this paper will serve to justify not only the increase in cyber-attacks but also the decrease in the required knowledge to conduct and be successful in the attack.

References

  1. Apache, "Apache Tomcat," {Online}. Available: http://tomcat.apache.org/. {Accessed 15 5 2015}.Google ScholarGoogle Scholar
  2. C. J. Marquez, "An Analysis of the IDS Penetration Tool: Metasploit," {Online}. Available: http://www.infosecwriters.com/text_resources/pdf/jmarquez_Metasploit.pdf.Google ScholarGoogle Scholar
  3. CVE, "Common Vulnerabilities and Exposures," {Online}. Available: http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2009-4188.Google ScholarGoogle Scholar
  4. G. Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, Nmap Project, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. v. Rossum, "Python Documentation," {Online}. Available: https://docs.python.org/2/library/os.html. {Accessed 15 5 2015}.Google ScholarGoogle Scholar
  6. G. v. Rossum, "Python," {Online}. Available: https://www.python.org/. {Accessed 16 5 2015}.Google ScholarGoogle Scholar
  7. H. Moore, "Metasploit," {Online}. Available: www.metasploit.com.Google ScholarGoogle Scholar
  8. H. Moore, "Metasploitable," {Online}. Available: https://community.rapid7.com/docs/DOC-1875.Google ScholarGoogle Scholar
  9. H. Moore, "Six Ways to Automate Metasploit," {Online}. Available: https://community.rapid7.com/community/metasploit/blog/2011/12/08/six-ways-to-automate-metasploit.Google ScholarGoogle Scholar
  10. jduck, "rapid7," {Online}. Available: http://www.rapid7.com/db/modules/exploit/multi/http/tomcat_mgr_deploy.Google ScholarGoogle Scholar
  11. Kaspersky, "2014 Security Bulletin," {Online}. Available: https://securelist.com/files/2014/12/Kaspersky-Security-Bulletin-2014-EN.pdf. {Accessed 16 5 2015}.Google ScholarGoogle Scholar
  12. M. Cantoni, "Rapid 7," {Online}. Available: http://www.rapid7.com/db/modules/auxiliary/admin/http/tomcat_administration.Google ScholarGoogle Scholar
  13. Mcclure, Scambray and Kurtz, Hacking Exposed 7, McGraw-Hill Osborne Media, 2011.Google ScholarGoogle Scholar
  14. Navigant, "2014 Cyber security Trends," {Online}. Available: http://www.navigant.com/insights/hottopics/technology-solutions-experts-corner/cyber-security-trends-2014-part-1/. {Accessed 15 5 2015}.Google ScholarGoogle Scholar
  15. P. Passeri, "hackmageddon," {Online}. Available: http://hackmageddon.com/?s=march+2015+timeline. {Accessed 23 4 2015}.Google ScholarGoogle Scholar
  16. w3techs {Online}. Available: http://w3techs.com/technologies/details/ws-tomcat/all/all.Google ScholarGoogle Scholar
  17. Wikipedia, "Common Vulnerabilities and Exposures," {Online}. Available: http://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures. {Accessed 16 5 2015}.Google ScholarGoogle Scholar

Index Terms

  1. An automated network intrusion process and countermeasures

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        PCI '15: Proceedings of the 19th Panhellenic Conference on Informatics
        October 2015
        438 pages
        ISBN:9781450335515
        DOI:10.1145/2801948

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 October 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        PCI '15 Paper Acceptance Rate64of148submissions,43%Overall Acceptance Rate190of390submissions,49%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader