Investigating the Ecosystem of Offensive Information Security Tools

12/16/2020
by   Simon D. Duque Anton, et al.
0

The internet landscape is growing and at the same time becoming more heterogeneous. Services are performed via computers and networks, critical data is stored digitally. This enables freedom for the user, and flexibility for operators. Data is easier to manage and distribute. However, every device connected to a network is potentially susceptible to cyber attacks. Security solutions, such as antivirus software or firewalls, are widely established. However, certain types of attacks cannot be prevented with defensive measures alone. Offensive security describes the practice of security professionals using methods and tools of cyber criminals. This allows them to find vulnerabilities before they become the point of entry in a real attack. Furthermore, following the methods of cyber criminals enables security professionals to adapt to a criminal's point of view and potentially discover attack angles formerly ignored. As cyber criminals often employ freely available security tools, having knowledge about these provides additional insight for professionals. This work categorises and compares tools regarding metrics concerning maintainability, usability and technical details. Generally, several well-established tools are available for the first phases, while phases after the initial breach lack a variety of tools.

READ FULL TEXT
research
05/21/2018

The Sounds of Cyber Threats

The Internet enables users to access vast resources, but it can also exp...
research
06/25/2020

HARMer: Cyber-attacks Automation and Evaluation

With the increasing growth of cyber-attack incidences, it is important t...
research
02/01/2022

Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs)

The increasing critical dependencies on Internetof-Things (IoT) have rai...
research
04/11/2018

How vulnerable are the Indian banks: A cryptographers' view

With the advent of e-commerce and online banking it has become extremely...
research
01/25/2023

SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation

Every attack begins with gathering information about the target. The ent...
research
09/24/2020

Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools

Cybersecurity tools are increasingly automated with artificial intellige...
research
02/24/2020

Cry Wolf: Toward an Experimentation Platform and Dataset for Human Factors in Cyber Security Analysis

Computer network defense is a partnership between automated systems and ...

Please sign up or login with your details

Forgot password? Click here to reset