CN106817382A - Attack test platform based on tool agent - Google Patents
Attack test platform based on tool agent Download PDFInfo
- Publication number
- CN106817382A CN106817382A CN201510852206.1A CN201510852206A CN106817382A CN 106817382 A CN106817382 A CN 106817382A CN 201510852206 A CN201510852206 A CN 201510852206A CN 106817382 A CN106817382 A CN 106817382A
- Authority
- CN
- China
- Prior art keywords
- attack
- tool
- information
- instrument
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/566—Grouping or aggregating service requests, e.g. for unified processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention discloses a kind of attack test platform based on tool agent, wherein, including:Attack Platform framework, attack tool proxy module, attack tool module and database;The database is used to store the information and the prior information for instructing attack process got in attack process;The Attack Platform framework is used to provide user interface, and for the instruction that attack personnel input attack tool is called, and obtain attack logs information and the database information;The attack tool module is used to store the instrument of various attacks;The attack tool proxy module includes multiple tool agents, and the plurality of tool agent is corresponded with each instrument in the attack tool module, and the respectively instrument is called according to the order of the Attack Platform framework, and arranges the operation result information of the instrument.
Description
Technical field
The invention belongs to field of information security technology, particularly a kind of attack based on tool agent
Test platform.
Background technology
With continuing to develop for information technology, the Information Environment residing for equipment in network is also got over
Come more complicated, active, passive every point of attack is per second to be occurred all on network, in network
Equipment will bear various attacks and illegal scanning in network, and this is just attacked to the anti-of equipment in network
The ability of hitting proposes requirement higher, for test equipment anti-attack ability in a network, needs
Consider to design corresponding Attack Platform, attack test is carried out to equipment, verify that it is being attacked
Resistivity when hitting.Due in network attack meanses it is numerous, and have a large amount of outstanding increase income
Attack checking software to be available for directly using, be often directly integrated when carrying out and attacking checking using big
Third-party instrument is measured, all kinds of third party software occupation modes are different, as a result show disunity,
Attack tool is effectively integrated using Attack Platform, makes each tool detection result effectively common
Enjoy, utilize, so as to form calling for unified instrument be arranged with attack result.
The content of the invention
It is an object of the invention to provide a kind of attack test platform based on tool agent, it is used for
Solve above-mentioned problem of the prior art.
A kind of attack test platform based on tool agent of the present invention, wherein, including:Attack flat
Table frame, attack tool proxy module, attack tool module and database;The database is used
The information got in attack process is stored and the priori for instructing attack process
Information;The Attack Platform framework is used to provide user interface, and is attacked for attack personnel input
The instruction that the instrument of hitting is called, and obtain attack logs information and the database information;The attack
Tool model is used to store the instrument of various attacks;The attack tool proxy module includes multiple works
Tool agency, the plurality of tool agent is corresponded with each instrument in the attack tool module, and
Order according to the Attack Platform framework is called to the respectively instrument, and arranges the fortune of the instrument
Row object information.
One embodiment of the attack test platform based on tool agent of the invention, wherein,
Each tool agent in attack tool agency is used for according to instruction calls its corresponding instrument,
And required prior information is called from the database according to instruction, by the prior information and
The tool information is attacked target.
One embodiment of the attack test platform based on tool agent of the invention, wherein,
The Attack Platform framework includes:Order issues module, for receiving user instruction, and judges to use
The legitimacy of family instruction;Method of calling configuration module, refers to according to the user that the order issues module
Order, calls the corresponding tool agent;Database displaying module, for showing the database in
Content;Attack effect shows that, for the information acted on behalf of according to the attack tool, display is attacked
Object information.
One embodiment of the attack test platform based on tool agent of the invention, wherein,
The prior information includes target port, destination address and password dictionary.
In sum, the present invention tune integrated to third party's tool software in order to solve Attack Platform
Compatibility issue is shown with result, it is proposed that a kind of attack test based on tool agent is put down
Platform, realizes the unified interface to the unified call of instrument, and realize to instrument by tool agent
The integration of result, makes the effective integrated third party's instrument of Attack Platform.By means of the invention it is possible to
A kind of Attack Platform of easy extension is built, can flexibly be existed by working out corresponding tool agent
Add-on third party attacks software in Attack Platform.Attack test of the present invention based on tool agent is put down
Platform can integrate the result of each instrument with integrated extensive attack tool of increasing income, and effectively be set
The test of standby attack resistance simultaneously effectively obtains result, assists developer to improve and has found that it is likely that presence
Safety problem.
Brief description of the drawings
Fig. 1 show the module map of the attack test platform based on tool agent.
Specific embodiment
It is below in conjunction with the accompanying drawings and real to make the purpose of the present invention, content and advantage clearer
Example is applied, specific embodiment of the invention is described in further detail.
Fig. 1 show the module map of the attack test platform based on tool agent, as shown in figure 1,
Attack test platform based on tool agent includes four parts, Attack Platform framework 1, attack work
Tool agency 3, attack tool 4 and database 2.
As shown in figure 1, Attack Platform framework 1 is used for the operation interface to user, for attacking personnel
Input attack tool calls relevant parameter, obtains attack logs result and database positioning, is to attack
Hit human users' Attack Platform medium.
As shown in figure 1, Attack Platform framework 1 issues module 11 including order, for receiving user
Instruction, including the required instrument and relevant parameter for calling, judge whether user instruction is legal;
Method of calling configuration module 12, the user instruction of module 11 is issued according to order, is called corresponding
Tool agent;Database displaying module 13, for the content in display data storehouse 2;Attack effect
Fruit displaying 14, the information for receiving attack tool agency 3, the object information attacked is shown
To user.
As shown in figure 1, attack tool agency 3 is the core of this Attack Platform, attack tool
Each tool agent in agency 3 is corresponded with each instrument in attack tool 4, Attack Platform frame
Frame 1 receives the order input for attacking designer's consolidation form, and acting on behalf of 3 by attack tool converts
It is the call instruction of instrument 1-n, instrument 1-n is called, in the invoked procedure of instrument 1-n
In, can be transported by the target of attack prior cases stored in database 2 and other attack tools
Row result is instructed attack tool;After the completion of instrument 1-n execution, agency can arrange and attack
The operation result of instrument is hit, and is arranged according to unified form, it is useful by what is be collected into
Information is arranged, and is updated the data storehouse 2 and is supplied to Attack Platform framework 1 to show in the form of daily record
Show.
As shown in figure 1, the tool agent 1-n in attack tool agency 3 is used for according to instruction calls
Its corresponding attack tool 1-n, according to instruction called from database needed for attack address,
The prior informations such as target port, password dictionary (conventional password).Tool agent 1-n is according to attacking
The type of instrument is hit, the log information of the attack tool needed for obtaining, and according to unified lattice
Formula is arranged, and is sent to Attack Platform framework, to be shown to user.
As shown in figure 1, for a specific embodiment, attack work of the attack tool 4 for needed for test
Tool collection, instrument is arranged in attack equipment, it is necessary to explanation, is not required here to third party
Instrument carries out any modification, including instrument method of calling and result return to form.Tool agent is led to
Attack tool in command calls attack equipment is crossed, the feedback of attack tool all feeds back to instrument generation
Reason is arranged.Database 2 is used to store the information that is got in attack process and refers to
The prior information of attack process is led, prior information or target before needing to utilize when attacking
During information, attack tool agency 3 can read corresponding value according to the configuration of order from database 2
Processed, database 2 also receives the data according to attack tool 4 from attack tool agency 3
The operation of storehouse 2 is used to be updated database 2.
As shown in figure 1, the attack test platform based on tool agent receives the instruction of user, and
Instruction calls according to user are corresponding to act on behalf of instrument 1-n;Acting on behalf of instrument adjusts 1-n corresponding with its
Attack tool 4, and the information according to needed for attack tool 4 calls database 2, according to user
Instruction calls prior information, such as target port, destination address and password dictionary etc.;Attack
Instrument 4 is attacked target according to the information called, and receives the feedback letter of attack result
Breath, attack tool acts on behalf of 1-n and required log information is sorted out from feedback information;Attack effect
Fruit display module 14 is shown to corresponding attack of user and imitates according to required log information is sorted out
Really.
Corresponded with reference to Fig. 1, tool agent 1-n and instrument 1-n, the unified life of Attack Platform
The method of calling that instrument can be flexibly defined in form is made, and is adjusted after tool agent is arranged
With;When needing to increase new third party's instrument in Attack Platform, should be installed in attack equipment
Corresponding instrument, and acted on behalf of according to the occupation mode organizational tool of instrument, realize being ordered according to unified
The instrument of order call and to instrument return result treatment;Instrument when before needs to update
When, it is only necessary to updating corresponding tool agent file, and the more new attack work in attack equipment
Tool;Attack Platform framework 1 displaying content include record attack perform attack logs file and
The content information of Attack Platform database 2, it is right according to its that attack logs file acts on behalf of 1-n by each attack
The implementing result generation of the instrument 1-n for answering, the content information of database 2 shows by directly reading number
Realized according to the copy content of storehouse 2.
With reference to Fig. 1, the building process of summary attack test platform of the present invention based on tool agent:
Build attack tool 1-n.The attack tool 1-n that will be needed to use is arranged on test equipment
In, attack tool 1-n can be called correctly, as a result can normally be shown;
Build database 2.Demand according to attack test builds database, and demand is taken an examination herein
How worry stores effective result (example that test is obtained:Target ip address, the mac ground for scanning
Location, open-ended situation information), how to store the prior information (example that test is called:Wait to attack
The target machine port hit), how to store the resource (example for needing in test process to use:Cruelly
Power cracks the dictionary file of needs).
Build attack tool agency 3.According to the characteristics of the attack tool installed, correspond and compile
Tool agent processed, the order of the consolidation form that tool agent is received is as shown in the table:
Tool agent 3 according to the order for receiving, and instrument call instruction parameter (if desired for),
Realization is called to instrument 1-n, and performs holding for time parameter monitoring tools according to instrument 1-n
OK, instrument executive process is closed if time-out, reference results storage parameter is being finished (such as
Need) Final finishing result, update the data storehouse, output journal.
Step 4:Build Attack Platform framework 1.It is visual according to unified attack format design
Parameter is input into, and designs journal displaying and database display interface.
In sum, the present invention tune integrated to third party's tool software in order to solve Attack Platform
Compatibility issue is shown with result, it is proposed that a kind of attack test based on tool agent is put down
Platform, realizes the unified interface to the unified call of instrument, and realize to instrument by tool agent
The integration of result, makes the effective integrated third party's instrument of Attack Platform.By means of the invention it is possible to
A kind of Attack Platform of easy extension is built, can flexibly be existed by working out corresponding tool agent
Add-on third party attacks software in Attack Platform.Attack test of the present invention based on tool agent is put down
Platform can integrate the result of each instrument with integrated extensive attack tool of increasing income, and effectively be set
The test of standby attack resistance simultaneously effectively obtains result, assists developer to improve and has found that it is likely that presence
Safety problem.
The above is only the preferred embodiment of the present invention, it is noted that led for this technology
For the those of ordinary skill in domain, on the premise of the technology of the present invention principle is not departed from, can be with
Some improvement and deformation are made, these are improved and deformation also should be regarded as protection scope of the present invention.
Claims (4)
1. a kind of attack test platform based on tool agent, it is characterised in that including:Attack
Platform framework, attack tool proxy module, attack tool module and database;
The database is used to store the information that is got in attack process and for instructing
The prior information of attack process;
The Attack Platform framework is used to provide user interface, and is attacked for attack personnel input
The instruction that instrument is called, and obtain attack logs information and the database information;
The attack tool module is used to store the instrument of various attacks;
The attack tool proxy module includes multiple tool agents, and the plurality of tool agent is attacked with this
Each instrument for hitting in tool model is corresponded, and according to the order of the Attack Platform framework to each
The instrument is called, and arranges the operation result information of the instrument.
2. the attack test platform of tool agent is based on as claimed in claim 1, and its feature exists
In each tool agent in attack tool agency is used for according to instruction calls its corresponding work
Tool, and required prior information is called from the database according to instruction, by the prior information
And the tool information is attacked target.
3. the attack test platform of tool agent is based on as claimed in claim 1, and its feature exists
In the Attack Platform framework includes:
Order issues module, for receiving user instruction, and judges the legitimacy of user instruction;
Method of calling configuration module, the user instruction of module is issued according to the order, calls correspondence
The tool agent;
Database displaying module, for showing the content in the database;
Attack effect shows, for the knot that the information acted on behalf of according to the attack tool, display are attacked
Fruit information.
4. the attack test platform of tool agent is based on as claimed in claim 1, and its feature exists
In the prior information includes target port, destination address and password dictionary.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510852206.1A CN106817382A (en) | 2015-11-30 | 2015-11-30 | Attack test platform based on tool agent |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510852206.1A CN106817382A (en) | 2015-11-30 | 2015-11-30 | Attack test platform based on tool agent |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106817382A true CN106817382A (en) | 2017-06-09 |
Family
ID=59157023
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510852206.1A Pending CN106817382A (en) | 2015-11-30 | 2015-11-30 | Attack test platform based on tool agent |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106817382A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101488890A (en) * | 2009-01-14 | 2009-07-22 | 成都市华为赛门铁克科技有限公司 | Method and system for network attack test |
CN101699815A (en) * | 2009-10-30 | 2010-04-28 | 华南师范大学 | Network attack automatic execution/exhibition system and method |
CN104410617A (en) * | 2014-11-21 | 2015-03-11 | 西安邮电大学 | Information safety attack and defense system structure of cloud platform |
-
2015
- 2015-11-30 CN CN201510852206.1A patent/CN106817382A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101488890A (en) * | 2009-01-14 | 2009-07-22 | 成都市华为赛门铁克科技有限公司 | Method and system for network attack test |
CN101699815A (en) * | 2009-10-30 | 2010-04-28 | 华南师范大学 | Network attack automatic execution/exhibition system and method |
CN104410617A (en) * | 2014-11-21 | 2015-03-11 | 西安邮电大学 | Information safety attack and defense system structure of cloud platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107659543B (en) | Protection method for APT (android packet) attack of cloud platform | |
CN106411578A (en) | Website monitoring system and method applicable to power industry | |
CN111177779B (en) | Database auditing method, device, electronic equipment and computer storage medium | |
CN103795707B (en) | Enterprise network security automatization test system and method | |
CN101031857A (en) | Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card | |
CN102130918A (en) | Account binding system for network logon authentication | |
CN104021219B (en) | The generation method and device of a kind of data template | |
CN107145784A (en) | A kind of method of vulnerability scanning, device and computer-readable medium | |
CN109766694A (en) | Program protocol white list linkage method and device of industrial control host | |
CN108829782A (en) | data table cleaning method, server and computer readable storage medium | |
CN1975678A (en) | Computer readable medium, information processing apparatus that executes program, and program control method for executing program | |
US20150242625A1 (en) | Pre-Delegation of Defined User Roles for Guiding User in Incident Response | |
CN107748706A (en) | A kind of binding method and device | |
CN110532461A (en) | Information platform method for pushing, device, computer equipment and storage medium | |
CN107315586A (en) | Using the methods, devices and systems of packing | |
WO2021051876A1 (en) | Batch authorization method and apparatus for emails, and computer device and storage medium | |
CN102915344A (en) | SQL (structured query language) statement processing method and device | |
CN110837646A (en) | Risk investigation device of unstructured database | |
CN107222497A (en) | Network traffic anomaly monitor method and electronic equipment | |
KR101897395B1 (en) | Design and System for managing Security Vulnerability based Standard Dataset for Developing and Validating Cyber Warfare Scenarios | |
CN111046382B (en) | Database auditing method, equipment, storage medium and device | |
CN106817382A (en) | Attack test platform based on tool agent | |
CN106610894A (en) | Interface testing method and device | |
CN109857748B (en) | Contract data processing method and device and electronic equipment | |
JP2005234661A (en) | Access policy creation system, method and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170609 |