|
- 2015
基于模拟攻击的内核提权漏洞自动利用系统
|
Abstract:
摘要 针对Linux下的内核级提权漏洞,基于模拟攻击的漏洞检测思想,设计并开发漏洞自动利用系统KernelPET,揭示典型提权漏洞的利用过程,从而为漏洞防御提供支持.KernelPET系统与主流漏洞库exploit-db、securityfocus等衔接,模拟攻击测试近百个提权漏洞,挑选30个经典的Linux内核提权漏洞载入KernelPET漏洞代码库,并基于不同内核、不同发行版的Linux平台测试.实验结果表明,KernelPET在多类发行版Linux系统下具有较好的效果.
[1] | Chen H G,Mao Y D,Wang X,et al.Linux kernel vulnerabilities:State-of-the-art defenses and open problems[C].Proceedings of the Second Asia-Pacific Workshop on Systems,ACM,2011. |
[2] | HD M,Spoon M,James L,et al.Metasploit[CP/OL].2014[2014-07-23].http://www.metasploit.com. |
[3] | Gordon L.Nmap[CP/OL].2014[2014-07-23]. http://nmap.org. |
[4] | Renaud D,Ron G.Nessus[CP/OL].2014[2014-07-23].http://www.tenable.com/products/nessus. |
[5] | Provos,Markus F,Peter H,et al.Preventing privilege escalation[C].Proceedings of the 12th USENIX Security Symposium,2003. |
[6] | 中国信息安全测评中心.中国信息安全国家漏洞库[DB/OL].2014[2014-07-23].http://www.cnnvd.org.cn. |
[7] | National Institute of Standards and Technology.American national vulnerability database[DB/OL].2014[2014-07-23].http://web.nvd.nist.gov. |
[8] | Treaster M,Koenig G A,Meng X,et al.Detection of privilege escalation for linux cluster security[C].Proceedings of the 6th LCI International Conference on Linux Clusters.2005. |
[9] | Offensive Security Team.Exploit database[DB/OL]. 2014[2014-07-23]2014.http://www.exploit-db.com. |
[10] | Freebuf Team.Freebuf安全社区[EB/OL].2014[2014-07-23].http://www.freebuf.com. |
[11] | Cobb C,Cobb S,Kabay M,et al.Penetrating computer systems and networks[M].Computer Security Handbook,2012.</p> |
[12] | <p> 刘奇旭,张玉清,宫亚峰,等.安全漏洞标识与描述规范的研究[J].信息网络安全,2011,7:4-6. |
[13] | Nimbalkar R,Patel P,Meshram B.Advanced linux security[J].Editorial Board,2013,2(3):7-12. |
[14] | O'Gorman J,Kearns D,Aharoni M.Metasploit:The Penetration Tester's Guide[M].San Francisco:No Starch Press,2011. |
[15] | 国家计算机网络入侵防范中心.国家安全漏洞库[DB/OL].2014[2014-07-23].http://www.nipc.org.cn/. |
[16] | 绿盟公司.绿盟漏洞数据库[DB/OL].2014[2014-07-23].http://www.nsfocus.net/vulndb. |
[17] | 国家计算机网络应急技术处理协调中心.中国国家信息安全漏洞共享平台[DB/OL].2014[2014-07-23].http://www.cnvd.org.cn. |
[18] | 绿盟公司.绿盟漏洞威胁态势报告[R],北京:绿盟科技,2013[2014-07-23].http://www.nsfocus.com.cn/4_research/4_6.html. |
[19] | Security-Database Company.Security vulnerability database[DB/OL].2014[2014-07-23].http://www.security-database.com. |
[20] | Symantec Company.Securityfocus vulnerability database[DB/OL].2014[2014-07-23].http://www.securityfocus.com/bid. |