论文标题

exploitwp2docker:自动化网络范围内脆弱的WordPress环境的平台

ExploitWP2Docker: a Platform for Automating the Generation of Vulnerable WordPress Environments for Cyber Ranges

论文作者

Caturano, Francesco, d'Ambrosio, Nicola, Perrone, Gaetano, Previdente, Luigi, Romano, Simon Pietro

论文摘要

网络范围是对组织网络基础架构的现实模拟,通常用于网络安全培训目的。它提供了一个安全的环境,可以评估进攻和防守技术的能力。在实现网络范围的过程中,重要的一步是脆弱的机器的产生。此步骤具有挑战性,需要艰苦的手动配置。几项旨在减少此开销的作品,但是当前的最新目的是在不考虑为Web应用程序构建脆弱环境所需的努力的情况下生成网络服务。网络范围应代表一个真实的系统,如今,几乎所有公司都使用通用内容管理系统(CMS)WordPress开发其公司网站,这也是最关键的攻击者入口点之一。提出的工作提出了一种方法,可以使用公共利用中提供的信息自动创建和配置脆弱的WordPress应用程序。我们的平台自动从最著名的公开利用数据库中提取信息,以生成和配置脆弱的环境。基于容器的虚拟化用于生成轻巧且易于部署的基础架构。最终的评估突出了有关通过我们的方法自动化脆弱环境产生的可能性的有希望的结果。

A cyber range is a realistic simulation of an organization's network infrastructure, commonly used for cyber security training purposes. It provides a safe environment to assess competencies in both offensive and defensive techniques. An important step during the realization of a cyber range is the generation of vulnerable machines. This step is challenging and requires a laborious manual configuration. Several works aim to reduce this overhead, but the current state-of-the-art focuses on generating network services without considering the effort required to build vulnerable environments for web applications. A cyber range should represent a real system, and nowadays, almost all the companies develop their company site by using WordPress, a common Content Management System (CMS), which is also one of the most critical attackers' entry points. The presented work proposes an approach to automatically create and configure vulnerable WordPress applications by using the information presented in public exploits. Our platform automatically extracts information from the most well-known publicly available exploit database in order to generate and configure vulnerable environments. The container-based virtualization is used to generate lightweight and easily deployable infrastructures. A final evaluation highlights promising results regarding the possibility of automating the generation of vulnerable environments through our approach.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源