CN103916384A - Penetration testing method for GAP isolation and exchange device - Google Patents

Penetration testing method for GAP isolation and exchange device Download PDF

Info

Publication number
CN103916384A
CN103916384A CN201410026981.7A CN201410026981A CN103916384A CN 103916384 A CN103916384 A CN 103916384A CN 201410026981 A CN201410026981 A CN 201410026981A CN 103916384 A CN103916384 A CN 103916384A
Authority
CN
China
Prior art keywords
test
switching equipment
gap isolation
penetration testing
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410026981.7A
Other languages
Chinese (zh)
Inventor
钟力
姚兰
阮强
何金勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
INFORMATION SURENESS EVALUATION CENTER PLA
Original Assignee
INFORMATION SURENESS EVALUATION CENTER PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by INFORMATION SURENESS EVALUATION CENTER PLA filed Critical INFORMATION SURENESS EVALUATION CENTER PLA
Priority to CN201410026981.7A priority Critical patent/CN103916384A/en
Publication of CN103916384A publication Critical patent/CN103916384A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a penetration testing method for a GAP isolation and exchange device. The method comprises the concrete steps that (a) policy configuration is tested, wherein according to the working principle, the function and the implementation mode of the tested device, applicable test cases are selected from a preset penetration testing rule base, and test environment parameters are configured; (b) a network attack session is generated, wherein an independent client program and an independent server program are established, hosts in networks at the two ends of the tested device are respectively simulated, afterwards, test plugins corresponding to the test cases are respectively called, and the test environment parameters configured in the step (a) are passed to the test plugins; the test plugins produce corresponding data packets in real time, the data packets are sent through a client or a server, and therefore the network attack session is generated; (c) test results are evaluated, wherein the test results of the test cases are evaluated according to the completion condition of the network attack session and the warning information of the tested device. By the application of the penetration testing method for the GAP isolation and exchange device, automated security testing for the GAP isolation and exchange device can be achieved.

Description

A kind of penetration testing method towards GAP isolation switching equipment
Technical field
The invention belongs to field of information security technology, relate to the security test for GAP isolation switching equipment, particularly relate to the penetration testing method of the main security feature such as application layer protocol control, content safety, intrusion prevention and anti-Trojan of GAP isolation switching equipment.
Background technology
Network security isolation switching system (GAP isolates switching equipment) adopts GAP isolation switching technology.So-called GAP isolation exchange, also referred to as Air GAP(air insulated) technology, its basic technical features is " physics blocking-up, logic connect ", by this technology, can ensure that two networks, on the unconnected basis of physics, realize logic and connect to carry out exchanges data.Network security isolation switching equipment structurally comprises Intranet processing unit, outer net processing unit, three modules of safety isolation switch processing unit.Wherein, Intranet processing unit connects internal network, and outer net processing unit connects external network, and the timesharing of safety isolation crosspoint is communicated with internal, external network processing unit, is data transmission channel unique between internal, external network processing unit.Its basic security technical requirement is as follows:
L procotol stops.Two networks that this system connects, connect and arrive at after the internal, external network processing unit of system at network, all will carry out procotol termination, peel off the protocol headers of network data, carry out pure exchanges data via safety isolation crosspoint.
L data security checks.Safety isolation crosspoint carries out safety detection to the data that will exchange, and guarantees that data are safe, for example, check whether whether data contain malicious code, meet the call format of respective application.
GAP isolation switching equipment possesses the functions such as safe isolation, information exchange and access control, and there is stronger anti-attack ability, because it has the termination characteristic to procotol, and support seldom or not to support general application layer protocol (very limited intranet and extranet data transmission channel), for example FTP, DNS and email protocol.Therefore, it is considered to conventionally than fire compartment wall, security gateway and UTM(UTM) product is safer.
The high strength safe of GAP isolation switching equipment has brought numerous difficulties to safety test, and the test case of much testing gateway type safety product cannot be isolated switching equipment to GAP and be formed effective test.Form effective test, must rely on only data channel, explication network/attack traffic.Therefore, the present invention has created a kind of penetration testing technology towards GAP isolation switching equipment, pretend and data content such as comprises at the mode by application layer protocol, produce the BlueDrama for application-specific, and Web attack and the polytype network attack session based on wooden horse behavior, realize Network Attack GAP is isolated to passing through of switching equipment, reached the target of effectively carrying out security test.
At present, for the security test of GAP isolation switching equipment, also do not form the method for system specifications, the method that each security evaluation mechanism generally adopts or taking manual test as main, coordinates for example give out a contract for a project instrument or hack tool of some aids to carry out.Tester needs artificial diverse network access or the network attack data GAP isolation switching equipment of flowing through that produces, and then according to access to netwoks situation, verifies the fail safe of GAP isolation switching equipment.Although the method for this manual cooperation aid can be isolated switching equipment to GAP and be carried out test to a certain degree, has the problems such as inefficiency, environment configurations complexity, be difficult to carry out test large batch of, that safety is controlled.
Summary of the invention
The object of this invention is to provide a kind of penetration testing method towards GAP isolation switching equipment, realize the security test to GAP isolation switching equipment.Application the present invention, can realize the legitimate network passage (for example HTTP or dedicated data transmission port) that utilizes GAP isolation switching equipment it is carried out to the target of penetration testing.The method comprises the following steps:
test Strategy configuration according to operation principle, function and the implementation of GAP isolation switching equipment, is selected applicable test case, and is configured test environment parameter from the penetration testing rule base setting in advance;
generating network is attacked session, build independently client and serve end program, simulate respectively the main frame in two networks (subnet) at GAP isolation two ends, client and serve end program call respectively probe card corresponding to test case, and the test environment parameter of step a configuration is passed to probe card; Probe card generates corresponding packet in real time, and sends via client or service end, and generating network is attacked session;
test result is passed judgment on, and according to the performance of network attack session, and alarm and the log information of GAP isolation switching equipment, jointly passes judgment on the test result of test case.
Brief description of the drawings
Fig. 1 is know-why frame diagram of the present invention.
Fig. 2 is the connection diagram of the present invention while testing.
Fig. 3 is workflow diagram of the present invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is further detailed explanation.
Fig. 1 is know-why frame diagram of the present invention, passes judgment on three parts form towards the penetration testing method of GAP isolation switching equipment by strategy configuration, session generation and result.Strategy configuration module is used for according to safety test demand, and customized network is attacked the strategy of session, mainly comprises that access control, Web attack and wooden horse is attacked; The main frame (client and service end) that session generation module simulation intranet and extranet network connects, according to the strategy of customization, produces the specific network attack session of explication, passes through tested GAP isolation switching equipment; Result is passed judgment on the state that module checks that this Network Attack passes through (pass through, be blocked, amendment etc.), and in conjunction with alarm and the audit information of GAP isolation switching equipment, determines test result, the safety function that assessment apparatus possesses or anti-attack ability.
At present, isolate the safe practice feature of switching equipment towards the penetration testing method of GAP isolation switching equipment according to GAP, the custom strategies of its tactful configuration module to BlueDrama and network attack session, mainly comprises following four aspects:
The various typical BlueDramas of l.Conventionally, the application that GAP isolates safely switching equipment support is fewer, and it is safer, particularly only supports special application; But for the face of extending one's service, safety isolation switching equipment is supported common application layer protocol or application, for example http protocol, email transfer protocol and database access conventionally; Here for various typical network applications, customized network session, tests the access control function of tested product.
L Web attacks session.For particularly Web application of typical network application, accurately customize the Web such as various cross site scriptings, SQL injection and attack session, test GAP isolation switching equipment is resisted the ability that Web attacks.
The conventional wooden horse of l is attacked session.Comprise conventional wooden horse communications and liaison or attack, and the malicious code behavior such as the wooden horse carrying via webpage or Email.
The wooden horse of l based on agreement camouflage attacked session.The attack of wooden horse and communication behavior are hidden in legitimate network agreement, and such as UDP, SMTP, HTTP, MSN, Dropbox etc. carry out deep test to the anti-attack ability of isolation switching equipment.
Fig. 2 is the connection diagram of application penetration testing system of the present invention in the time of test.Penetration testing system is required to be dual-homed host platform, can be notebook computer, PC main frame or the server with two network interfaces; Client C and service end S are two communication entities of the real-time generation Network Attack of penetration testing system, are bundled in respectively on different network interfaces; Interface 1 and interface 2 are the Inside and outside network interfaces on GAP isolation switching equipment.
When test, the client C of penetration testing system is connected with interface 2 with the interface 1 of GAP isolation switching equipment respectively with service end S, the main frame in two networks that simulation GAP isolation switching equipment is isolated.Like this, the Network Attack that penetration testing system produces will pass through GAP isolation switching equipment, and form closed loop in penetration testing system.As tester, the client C of penetration testing system and service end S should not have the data retransmission in main frame, do not have bypass when guaranteeing to test.
Fig. 3 is workflow diagram of the present invention, is divided into following three steps:
test Strategy configuration according to operation principle, safety function and the implementation of GAP isolation switching equipment, is selected applicable test case, and is configured test environment parameter from the penetration testing rule base setting in advance;
generating network is attacked session, build independently client and serve end program, simulate respectively the main frame in two networks (subnet) at GAP isolation switching equipment two ends, client and serve end program call respectively probe card corresponding to test case, and the test environment parameter of step a configuration is passed to probe card; Probe card generates corresponding packet in real time, and sends via client or service end, and generating network is attacked session;
test result is passed judgment on, and according to the performance of network attack session, and alarm and the log information of GAP isolation switching equipment, jointly passes judgment on the test result of test case.
Here, we are elaborated by the test process of the wooden horse Test Strategy of an application layer protocol camouflage.
First hypothesis will be tested of certain a unit GAP isolation switching equipment now, and this equipment is for connecting two dissimilar networks of this unit, and the function that it is born is the transfer of data of internal-external network, possesses HTTP access and database synchronization function.In equipment, the network segment is 172.16.1.1/24, and the outer network segment is 100.100.1.1/24.The all safety functions of this opening of device and data-transformation facility, its security feature is without collocation strategy.
(1) Test Strategy configuration
It is upper that strategy is embodied in rule, and configuration rule is filled these two data structures below exactly, thereby generates concrete test case.For the penetration testing strategy that utilizes wooden horse, here to customize a wooden horse based on http protocol camouflage as example, the HTTP passage of attempting isolating by GAP switching equipment passes through.Parameter in the data structure of this wooden horse test case rule need configure as follows:
typedef?struct?tagCaseInfo
{
CHAR szID[100]; // test case numbering: GS-005
CHAR szName[100]; // test case title: grey pigeon wooden horse
CHAR szDescription[255]; // test case is described: grey pigeon wooden horse simulation http communication penetrates xegregating unit from accessing outer network from inner network
CHAR szVulnName[50]; // fragility title: grey pigeon wooden horse
CHAR szVulnDisc[255]; // fragility is described: whether test network shielding system can defend the Intranet behavior that penetrates of grey pigeon wooden horse
CHAR szVulnType[255]; // fragility type: data exchange service fragility
Int nRiskLevel; // risk class: 1=low-risk 2=risk 3=excessive risk
Int nPolicyType; // policing type: 1=" elementary tactics "; 2=" recommending strategy "; 3=" maximum strategy "
}CASEINFO
typedef?struct?tagCaseVar
{
CString strClientIP; // true Intranet client ip: 172.16.1.11
CString strServerIP; // true outer net client ip: 100.100.1.11
CString ClientIP; // virtual Intranet client ip: sky
CString ServerIP; // virtual outer net client ip: sky
CString proxyCltIP; // Intranet agent address IP:172.16.1.1
CString proxyServIP; // outer net agent address IP: sky
DWORD dwPort[20]; // dwPort[0-9] be different service agent port; DwPort[10-19] be different service real ports: dwPort[1]=80
CString strKey[20]; // be respectively different agreement filtering content
BOOL bAction[20]; // xegregating unit different agreement configuring condition; True is for allowing, and False is not for allowing
INT Flag; // proxy mode, 1: authorized agency, 2: Transparent Proxy
Char szErrorMsg[255]; // the information that reports an error, for pinpointing the problems
}CASEVAR
Each test case is an independent dll file, every kind of all definition separately in dll file of malicious code critical field.
While generating concrete packet according to this test case, these parameters can pass to corresponding probe card, the content that need to change when probe card generated data bag embodies in these parameters, do not need the content changing to be directly stored in probe card itself, probe card generates concrete one by one test packet according to the content of storing in the parameter in this structure and probe card.
(2) BlueDrama generates
After generating test use case, can test, client and service end can generate concrete packet according to the parameter in regular texture corresponding to test case.Packet can be attempted to pass through GAP isolation switching equipment and arrive the other side, packet of every transmission all can be waited for the other side's response packet, after only receiving the response packet of expectation, just can send next packet (if not data interception bag of GAP isolation switching equipment, packet of every transmission is the response packet that is certain to receive expectation), otherwise, after waiting for a period of time, interrupt the transmission of packet.
(3) test result evaluation
Whether successful according to network attack session, and alarm and the audit situation of GAP isolation switching equipment, jointly determine whether this ash pigeon wooden horse successfully permeates GAP isolation switching equipment.If network attack session is successfully completed, illustrate that this GAP isolation switching equipment can not utilize this grey pigeon wooden horse that http protocol pretends to be on the defensive.If network attack session is blocked (not completing), and GAP isolation switching equipment has correct alarm and daily record, illustrates that this GAP isolation switching equipment possesses the ability that this wooden horse is attacked of resisting.

Claims (2)

1. towards a penetration testing method for GAP isolation switching equipment, comprise the following steps:
(a) Test Strategy configuration according to operation principle, function and the implementation of GAP isolation switching equipment, is selected applicable test case, and is configured test environment parameter from the penetration testing rule base setting in advance; (b) generating network is attacked session, build independently client and serve end program, simulate respectively the main frame in two networks (subnet) at GAP isolation switching equipment two ends, client and serve end program call respectively probe card corresponding to test case, and the test environment parameter of step a configuration is passed to probe card; Probe card generates corresponding packet in real time, and sends via client or service end, and generating network is attacked session; (c) test result is passed judgment on, and according to the performance of network attack session, and alarm and the log information of GAP isolation switching equipment, jointly passes judgment on the test result of test case.
2. application the present invention, can realize the target of utilizing the legitimate network passage (for example HTTP or dedicated data transmission port) of GAP isolation switching equipment to carry out security test to it.
CN201410026981.7A 2014-01-21 2014-01-21 Penetration testing method for GAP isolation and exchange device Pending CN103916384A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410026981.7A CN103916384A (en) 2014-01-21 2014-01-21 Penetration testing method for GAP isolation and exchange device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410026981.7A CN103916384A (en) 2014-01-21 2014-01-21 Penetration testing method for GAP isolation and exchange device

Publications (1)

Publication Number Publication Date
CN103916384A true CN103916384A (en) 2014-07-09

Family

ID=51041791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410026981.7A Pending CN103916384A (en) 2014-01-21 2014-01-21 Penetration testing method for GAP isolation and exchange device

Country Status (1)

Country Link
CN (1) CN103916384A (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104852921A (en) * 2015-05-25 2015-08-19 烽火通信科技股份有限公司 Test system and method for protecting open port from attacking for network equipment
CN105487977A (en) * 2015-11-30 2016-04-13 北京锐安科技有限公司 Agility-oriented automatic test management system and method
US10038711B1 (en) 2017-01-30 2018-07-31 XM Ltd. Penetration testing of a networked system
US10068095B1 (en) 2017-05-15 2018-09-04 XM Cyber Ltd Systems and methods for selecting a termination rule for a penetration testing campaign
US10122750B2 (en) 2017-01-30 2018-11-06 XM Cyber Ltd Setting-up penetration testing campaigns
US10257220B2 (en) 2017-01-30 2019-04-09 Xm Cyber Ltd. Verifying success of compromising a network node during penetration testing of a networked system
US10367846B2 (en) 2017-11-15 2019-07-30 Xm Cyber Ltd. Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
US10382473B1 (en) 2018-09-12 2019-08-13 Xm Cyber Ltd. Systems and methods for determining optimal remediation recommendations in penetration testing
US10412112B2 (en) 2017-08-31 2019-09-10 Xm Cyber Ltd. Time-tagged pre-defined scenarios for penetration testing
US10440044B1 (en) 2018-04-08 2019-10-08 Xm Cyber Ltd. Identifying communicating network nodes in the same local network
US10447721B2 (en) 2017-09-13 2019-10-15 Xm Cyber Ltd. Systems and methods for using multiple lateral movement strategies in penetration testing
US10462177B1 (en) 2019-02-06 2019-10-29 Xm Cyber Ltd. Taking privilege escalation into account in penetration testing campaigns
US10469521B1 (en) 2018-11-04 2019-11-05 Xm Cyber Ltd. Using information about exportable data in penetration testing
US10534917B2 (en) 2017-06-20 2020-01-14 Xm Cyber Ltd. Testing for risk of macro vulnerability
CN110830330A (en) * 2019-12-06 2020-02-21 浙江中控技术股份有限公司 Firewall testing method, device and system
US10574687B1 (en) 2018-12-13 2020-02-25 Xm Cyber Ltd. Systems and methods for dynamic removal of agents from nodes of penetration testing systems
US10574684B2 (en) 2017-07-09 2020-02-25 Xm Cyber Ltd. Locally detecting phishing weakness
US10581802B2 (en) 2017-03-16 2020-03-03 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for advertising network security capabilities
US10637883B1 (en) 2019-07-04 2020-04-28 Xm Cyber Ltd. Systems and methods for determining optimal remediation recommendations in penetration testing
US10686822B2 (en) 2017-01-30 2020-06-16 Xm Cyber Ltd. Systems and methods for selecting a lateral movement strategy for a penetration testing campaign
CN111683044A (en) * 2020-04-27 2020-09-18 南京国电南自电网自动化有限公司 Method and device for automatically detecting forward isolation device strategy
US10880326B1 (en) 2019-08-01 2020-12-29 Xm Cyber Ltd. Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic
US11005878B1 (en) 2019-11-07 2021-05-11 Xm Cyber Ltd. Cooperation between reconnaissance agents in penetration testing campaigns
US11206281B2 (en) 2019-05-08 2021-12-21 Xm Cyber Ltd. Validating the use of user credentials in a penetration testing campaign
US11283827B2 (en) 2019-02-28 2022-03-22 Xm Cyber Ltd. Lateral movement strategy during penetration testing of a networked system
US11533329B2 (en) 2019-09-27 2022-12-20 Keysight Technologies, Inc. Methods, systems and computer readable media for threat simulation and threat mitigation recommendations
US11575700B2 (en) 2020-01-27 2023-02-07 Xm Cyber Ltd. Systems and methods for displaying an attack vector available to an attacker of a networked system
US11582256B2 (en) 2020-04-06 2023-02-14 Xm Cyber Ltd. Determining multiple ways for compromising a network node in a penetration testing campaign

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101447898A (en) * 2008-11-19 2009-06-03 中国人民解放军信息安全测评认证中心 Test system used for network safety product and test method thereof
CN101447991A (en) * 2008-11-19 2009-06-03 中国人民解放军信息安全测评认证中心 Test device used for testing intrusion detection system and test method thereof
CN102468985A (en) * 2010-11-01 2012-05-23 北京神州绿盟信息安全科技股份有限公司 Method and system for carrying out penetration test on network safety equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101447898A (en) * 2008-11-19 2009-06-03 中国人民解放军信息安全测评认证中心 Test system used for network safety product and test method thereof
CN101447991A (en) * 2008-11-19 2009-06-03 中国人民解放军信息安全测评认证中心 Test device used for testing intrusion detection system and test method thereof
CN102468985A (en) * 2010-11-01 2012-05-23 北京神州绿盟信息安全科技股份有限公司 Method and system for carrying out penetration test on network safety equipment

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104852921A (en) * 2015-05-25 2015-08-19 烽火通信科技股份有限公司 Test system and method for protecting open port from attacking for network equipment
CN105487977A (en) * 2015-11-30 2016-04-13 北京锐安科技有限公司 Agility-oriented automatic test management system and method
US10686822B2 (en) 2017-01-30 2020-06-16 Xm Cyber Ltd. Systems and methods for selecting a lateral movement strategy for a penetration testing campaign
US10122750B2 (en) 2017-01-30 2018-11-06 XM Cyber Ltd Setting-up penetration testing campaigns
US10257220B2 (en) 2017-01-30 2019-04-09 Xm Cyber Ltd. Verifying success of compromising a network node during penetration testing of a networked system
US10999308B2 (en) 2017-01-30 2021-05-04 Xm Cyber Ltd. Setting-up penetration testing campaigns
US10038711B1 (en) 2017-01-30 2018-07-31 XM Ltd. Penetration testing of a networked system
US10637882B2 (en) 2017-01-30 2020-04-28 Xm Cyber Ltd. Penetration testing of a networked system
US10505969B2 (en) 2017-01-30 2019-12-10 Xm Cyber Ltd. Setting-up penetration testing campaigns
US10581802B2 (en) 2017-03-16 2020-03-03 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for advertising network security capabilities
US10068095B1 (en) 2017-05-15 2018-09-04 XM Cyber Ltd Systems and methods for selecting a termination rule for a penetration testing campaign
US10534917B2 (en) 2017-06-20 2020-01-14 Xm Cyber Ltd. Testing for risk of macro vulnerability
US10574684B2 (en) 2017-07-09 2020-02-25 Xm Cyber Ltd. Locally detecting phishing weakness
US10412112B2 (en) 2017-08-31 2019-09-10 Xm Cyber Ltd. Time-tagged pre-defined scenarios for penetration testing
US10447721B2 (en) 2017-09-13 2019-10-15 Xm Cyber Ltd. Systems and methods for using multiple lateral movement strategies in penetration testing
US10367846B2 (en) 2017-11-15 2019-07-30 Xm Cyber Ltd. Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
US10454966B2 (en) 2017-11-15 2019-10-22 Xm Cyber Ltd. Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
US11206282B2 (en) 2017-11-15 2021-12-21 Xm Cyber Ltd. Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
US10440044B1 (en) 2018-04-08 2019-10-08 Xm Cyber Ltd. Identifying communicating network nodes in the same local network
US10382473B1 (en) 2018-09-12 2019-08-13 Xm Cyber Ltd. Systems and methods for determining optimal remediation recommendations in penetration testing
US10469521B1 (en) 2018-11-04 2019-11-05 Xm Cyber Ltd. Using information about exportable data in penetration testing
US10574687B1 (en) 2018-12-13 2020-02-25 Xm Cyber Ltd. Systems and methods for dynamic removal of agents from nodes of penetration testing systems
US10462177B1 (en) 2019-02-06 2019-10-29 Xm Cyber Ltd. Taking privilege escalation into account in penetration testing campaigns
US11283827B2 (en) 2019-02-28 2022-03-22 Xm Cyber Ltd. Lateral movement strategy during penetration testing of a networked system
US11206281B2 (en) 2019-05-08 2021-12-21 Xm Cyber Ltd. Validating the use of user credentials in a penetration testing campaign
US10637883B1 (en) 2019-07-04 2020-04-28 Xm Cyber Ltd. Systems and methods for determining optimal remediation recommendations in penetration testing
US10880326B1 (en) 2019-08-01 2020-12-29 Xm Cyber Ltd. Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic
US11533329B2 (en) 2019-09-27 2022-12-20 Keysight Technologies, Inc. Methods, systems and computer readable media for threat simulation and threat mitigation recommendations
US11005878B1 (en) 2019-11-07 2021-05-11 Xm Cyber Ltd. Cooperation between reconnaissance agents in penetration testing campaigns
CN110830330A (en) * 2019-12-06 2020-02-21 浙江中控技术股份有限公司 Firewall testing method, device and system
US11575700B2 (en) 2020-01-27 2023-02-07 Xm Cyber Ltd. Systems and methods for displaying an attack vector available to an attacker of a networked system
US11582256B2 (en) 2020-04-06 2023-02-14 Xm Cyber Ltd. Determining multiple ways for compromising a network node in a penetration testing campaign
CN111683044A (en) * 2020-04-27 2020-09-18 南京国电南自电网自动化有限公司 Method and device for automatically detecting forward isolation device strategy

Similar Documents

Publication Publication Date Title
CN103916384A (en) Penetration testing method for GAP isolation and exchange device
CN101447898B (en) Test system used for network safety product and test method thereof
CN105227383B (en) A kind of device of network topology investigation
Fovino et al. An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants
CN105450442B (en) A kind of network topology investigation method and its system
Radoglou-Grammatikis et al. Attacking iec-60870-5-104 scada systems
Urias et al. Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed
CN103746885A (en) Test system and test method oriented to next-generation firewall
Babay et al. Deploying intrusion-tolerant scada for the power grid
Rosa et al. Attacking SCADA systems: A practical perspective
Bernieri et al. Mimepot: a model-based honeypot for industrial control networks
Qassim et al. Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
Dehlaghi-Ghadim et al. ICSSIM—a framework for building industrial control systems security testbeds
Tippenhauer et al. Vbump: Securing ethernet-based industrial control system networks with vlan-based traffic aggregation
Rahman et al. Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms
Weerathunga et al. The importance of testing Smart Grid IEDs against security vulnerabilities
Banik et al. Implementing man-in-the-middle attack to investigate network vulnerabilities in smart grid test-bed
Carcano et al. Scada malware, a proof of concept
Alquwatli et al. Review of scada systems and iot honeypots
Pranggono et al. Intrusion detection systems for critical infrastructure
Basan et al. Exploring Security Testing Methods for Cyber-Physical Systems
Rodofile Generating attacks and labelling attack datasets for industrial control intrusion detection systems
Ivanova Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity
Zhang An implementation of scada network security testbed
Parcharidis Simulation of cyber attacks against SCADA systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140709