{"title":"渗透测试中的黑客工具识别","authors":"Da-Yu Kao, Yun-Ya Chen, Fuching Tsai","doi":"10.23919/ICACT48636.2020.9061401","DOIUrl":null,"url":null,"abstract":"With the rapid development of information technology, cybercrimes are getting increasingly rampant. The popularity of various toolkits facilitates the cyber-attackers to intrude on online systems and access the vast streams of sensitive data. Prevention is better than cure. Penetration testing (PT) not only defends the illegal attacks but also identify potential vulnerabilities. It is capable of distinguishing network traffic on the massive amount of collected data from the following three phases: data reduction, data analysis, and data classification. This paper analyzes the PT network traffic and observes their tool marks.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"415 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hacking Tool Identification in Penetration Testing\",\"authors\":\"Da-Yu Kao, Yun-Ya Chen, Fuching Tsai\",\"doi\":\"10.23919/ICACT48636.2020.9061401\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid development of information technology, cybercrimes are getting increasingly rampant. The popularity of various toolkits facilitates the cyber-attackers to intrude on online systems and access the vast streams of sensitive data. Prevention is better than cure. Penetration testing (PT) not only defends the illegal attacks but also identify potential vulnerabilities. It is capable of distinguishing network traffic on the massive amount of collected data from the following three phases: data reduction, data analysis, and data classification. This paper analyzes the PT network traffic and observes their tool marks.\",\"PeriodicalId\":296763,\"journal\":{\"name\":\"2020 22nd International Conference on Advanced Communication Technology (ICACT)\",\"volume\":\"415 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 22nd International Conference on Advanced Communication Technology (ICACT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ICACT48636.2020.9061401\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICACT48636.2020.9061401","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hacking Tool Identification in Penetration Testing
With the rapid development of information technology, cybercrimes are getting increasingly rampant. The popularity of various toolkits facilitates the cyber-attackers to intrude on online systems and access the vast streams of sensitive data. Prevention is better than cure. Penetration testing (PT) not only defends the illegal attacks but also identify potential vulnerabilities. It is capable of distinguishing network traffic on the massive amount of collected data from the following three phases: data reduction, data analysis, and data classification. This paper analyzes the PT network traffic and observes their tool marks.