Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools
Abstract
:1. Introduction
1.1. Research Contributions
- Survey of Research-informed EH Tools: This study surveys 100 research-informed EH tools developed in the last decade. It highlights key areas such as licensing, release dates, source code availability, development activity level, and peer review status. This analysis aims to provide insights into the state-of-the-art EH tools developed by the research community.
- Alignment with Recognised Frameworks: This study categorises the tools into process-based frameworks, such as the Penetration Testing Execution Standard (PTES) [9], and the Mitre ATT&CK framework [10] and knowledge-based frameworks like the National Cyber Security Centre’s Cyber Security Body Of Knowledge (CyBOK) [11] and the Association for Computing Machinery’s Computing Classification System (ACM CCS) [12]. Combining these four classifications offers an informative view of the landscape of novel and research-informed ethical tools, their functionality, and application domain for the benefit of scholars, researchers, and practitioners.
1.2. Outline of the Paper
2. Background
2.1. (Unethical) Hacking Landscape and Motivations
- Economic Gain: Cybercriminals often target individuals, businesses, or organisations to extort money through ransomware [18] or financial fraud. Financial institutions such as banks and related services can be a target, as in the case of the attack on the SWIFT international transaction system [19].
- Competitive Advantage and Sabotage: Competing companies, state-sponsored actors, and individuals can steal and reveal industrial secrets and intellectual properties to gain a competitive edge and compromise the data integrity and accessibility in businesses. While the WannaCry ransomware was used primarily to extort money from the victims, the attack on the UK National Health Service (NHS) could have also been conducted to demonstrate the business complacency and lack of digital transformation [18].
- Personal Revenge: Cyberattacks driven by personal revenge are often perpetrated by disgruntled insiders or individuals with a vendetta against specific targets. These attacks leverage insider knowledge or access to inflict damage, disrupt operations, or steal sensitive data.
- Political: The attack is carried out as groups of hackers engaged in politics, sponsored-stated hacking teams aiming at damaging specific targets. This includes governmental institutions, political parties, social society organisations and other public subjects. Examples are the alleged interference in the US presidential elections by Russian state-sponsored cyber actors in 2016 [20], and the Operation Socialist in 2010–2013 against Belgacom attributed to the UK’s GCHQ [21], a case of an attack perpetrated by a NATO member state against another one.
2.2. Ethical Hacking
2.3. Ethical Hackers
- White Hat (ethical): Embodies the principles of hacker culture by employing technical skills to proactively enhance system security measures. These individuals focus on identifying vulnerabilities and developing defensive strategies to mitigate potential risks.
- Black Hat (malicious): Represents individuals who maliciously exploit vulnerabilities within systems for personal gain or disruptive purposes. Their actions typically involve unauthorised access, data theft, and system manipulation, often resulting in financial losses or reputational damage for targeted entities.
- Grey Hat (undecided): Occupies an intermediary role, engaging in activities that blur the line between ethical and malicious hacking. These individuals engage in operations as both Black Hat and White Hat, depending on the circumstances [27].
2.4. Ethical Hacking Methodologies
- Reconnaissance: The hacker gathers information on systems and users through passive or active techniques. This includes physical methods like social engineering and analysing network packets to identify details such as network configuration, hardware, and security measures.
- Scanning: The hacker searches for vulnerabilities in systems through simulated tests, including identifying open ports, active hosts, and weak firewall configurations. Enumeration is then carried out to gather further information while maintaining an active connection.
- Gaining Access: The hacker attempts to access the system using penetration testing tools and techniques, aiming to bypass security measures.
- Maintaining Access: The hacker establishes backdoors or rootkits to maintain remote access with elevated privileges.
- Covering Tracks: The hacker eliminates evidence that could reveal their identity or traces of the attack.
2.4.1. PTES
2.4.2. Mitre ATT&CK
2.4.3. PCI DSS Penetration Testing Guidance
2.4.4. ISSAF
2.4.5. OSSTMM
2.4.6. NIST800-115
2.4.7. OWASP
3. Survey Methodology
3.1. Criteria for Inclusion of Ethical Hacking Tools in the Paper
- Academic and research context: The tool has been developed within an academic/research project: this excludes any tools developed primarily as practitioner tools (e.g., they are included in a popular EH distribution, like Kali Linux).
- Peer-reviewed research papers: Each EH tool included in the survey must be published in a peer-reviewed venue. Peer review validates the tool’s architecture, functionalities, and relevance.
- Potential for offensive use: The tool has at least the potential to be used in an offensive context even if authors do not state that explicitly, as the tool could have been developed for another purpose (e.g., software testing, supporting software or system development).
- Authorship by tool developers: The survey also requires that the authors of the papers have designed/developed the tool. This criterion ensures credibility and depth of insight, as the creators are directly involved in its conception and development.
- Open source availability: The tool should be open source, and the source code (or distribution package) should be freely available. However, this requirement was relaxed throughout the research as we acknowledged that some tools may not be open-source for various reasons, such as their proprietary nature, pending patents, or limited accessibility.
3.2. Collating Research-Informed Ethical Hacking Tools
- Difficulty of the students in distinguishing between research-informed and practitioner tools.
- Confusion between papers describing the design and implementation of a tool and those describing its application.
- The approach of identifying tools first and then searching for papers to support the findings leads to the above misconceptions.
3.3. Classification of Identified Ethical Hacking Tools
4. Cybersecurity Frameworks Used for Tools Classification
4.1. Penetration Testing Execution Standard
- Pre-engagement Interactions: In this phase, the scope and rules of engagement are defined through an agreement between the penetration testing team and the system’s owner. The system’s owner must provide permissions and authorisations, and communication lines must be established between the testers and the target organisation.
- Intelligence Gathering: Information about the target organisation or system is collected using techniques such as open-source intelligence (OSINT) gathering, reconnaissance, and network scanning. Active and passive information-gathering methods are distinguished based on direct interaction with the target system.
- Threat Modelling: This phase identifies potential vulnerabilities and threats specific to the target organisation or system. It involves analysing collected information, understanding infrastructure and architecture, prioritising attack vectors, and assigning risks to threats to inform vulnerability mitigation.
- Vulnerability Analysis: Vulnerabilities and weaknesses in the target’s systems and applications are identified and assessed, typically using classification systems like the Common Vulnerability Scoring System (CVSS). Manual and automated testing, configuration analysis, and examination of insecure application design may be involved.
- Exploitation: Vulnerabilities previously identified are exploited to compromise the target system, gain unauthorised access, or execute malicious activities. The goal is to demonstrate the impact of vulnerabilities and their potential exploitation, bypassing security mechanisms.
- Post-Exploitation: After successful exploitation, the focus shifts to determining the value of the compromised system, maintaining access, escalating privileges, and pivoting to other systems within the network. This simulates an attacker’s post-compromise activities, considering the data’s importance and the advantage provided for further attacks.
- Reporting: The final phase involves documenting the findings, including identified vulnerabilities, their impact, and recommendations for remediation. The report should be clear, concise, and actionable for the target organisation, tailored to various audiences ranging from senior managers to technical staff.
4.2. Mitre ATT&CK Framework
- Reconnaissance: Collecting information on the target to plan and execute attacks. Methods include: Active Scanning, Passive Scanning, Social Engineering and OSINT.
- Resource Development: Acquiring resources required for further exploitation and maintaining access. Methods include: Developing Tools and Developing and Executing Malware.
- Initial Access: Techniques performed to gain access to the target environment. Methods to achieve this include: Spear-Phishing, Exploiting Vulnerabilities and Stolen Credentials.
- Execution: Techniques performed executing Malicious Software (Malware) on a target system. Methods include: Executing Binaries, Scripts and System Tools.
- Persistence: Techniques performed around maintaining system access over a significant period of time. Methods include: Backdoor Creation and Scheduled Tasks.
- Privilege Escalation: Increasing the access control levels in the compromised environment. Methods include: Vulnerability Exploitation, Configuration Manipulation and Credential Theft.
- Defence Evasion: Techniques to avoid detection or target defensive mechanisms. Methods include: Anti-Virus Evasion, Obfuscation and Living-off-the-land Techniques.
- Credential Access: Techniques for stealing credentials for unauthorised access. Methods include: Credential Dumping, Keylogging and Brute-Force Attacks.
- Discovery: Techniques for identifying information about the target system. Methods include: Network Scanning, System Enumeration and Querying Systems.
- Lateral Movement: Methods for moving through the network for accessing additional systems by using RDP, Trust Relationships and Lateral Tool Transfer.
- Collection: Acquiring and consolidating target system information. Methods include: Data Mining, Scraping and Information Capture.
- Command and Control: Creating and Maintaining communication channels between the attacker and compromised systems. Methods include: Command and Control (C2), Covert Channels and Network Protocols.
- Exfiltration: Techniques around the unauthorised data transfer external to the target environment. Methods include: Network Data Exfiltration, Encryption Channels and Scheduled Transfer.
- Impact: Achieving the desired outcome or effect could involve damaging a target. Methods include: Destroying Data, System Operation Disruption and Deploying Malware.
4.3. NCSC CyBOK
- Introductory Concepts: Introduction to CyBOK.
- Human, Organisational and Regulatory Aspects: (a) Risk Management and Governance, (b) Law and Regulation, (c) Human Factors and (d) Privacy and Online Rights.
- Attacks and Defences: (a) Malware and Attack Technologies, (b) Adversarial Behaviours, (c) Security Operations and Incident Management and (d) Forensics.
- Systems Security: (a) Cryptography, (b) Operating Systems and Virtualisation Security, (c) Distributed Systems Security, (d) Formal Methods for Security and (e) Authentication, Authorisation, and Accountability.
- Software and Platform Security: (a) Software Security, (b) Web and Mobile Security and (c) Secure Software Lifecycle.
- Infrastructure Security: (a) Applied Cryptography, (b) Network Security, (c) Hardware Security, (d) Cyber Physical Systems and (e) Physical Layer and Telecommunications Security.
- Introductory Concepts: Introduction to CyBOK.
- Human, Organisational and Regulatory Aspects
- (a)
- Risk Management and Governance: Asset assessment, identification and management.
- (b)
- Law and Regulation: Regulatory Compliance with national and international legislation.
- (c)
- Human Factors: Physical and Digital Social Engineering techniques targeting the human state vulnerability characteristics and exploiting these in a cybersecurity context.
- (d)
- Privacy and Online Rights: Purpose limitation, data transparency, and minimisation.
- Attacks and Defences
- (a)
- Malware and Attack Technologies: Attack techniques, analysis, and detection of malware, including response using evasive countermeasures and disruption of malware operations.
- (b)
- Adversarial Behaviours: Characterising cybercriminals based on their motivation (e.g., financial, political, etc.), types of cyber offences (cyber-enabled and cyber-dependent crimes), and the activities performed in a cyber attacks.
- (c)
- Security Operations and Incident Management: The management of secure systems, including the setup, operation, maintenance, incident response, and using threat intelligence for detection and security measures.
- (d)
- Forensics: Data acquisition, file system and block device analysis, as well as data recovery and file content carving, including SaaS.
- Systems Security
- (a)
- Cryptography: Techniques for securing data and communications: encryption algorithms, cryptographic protocols, key management, and others.
- (b)
- Operating Systems and Virtualisation Security: Authentication and identification, Access Control Lists (ACL), memory protection and address spaces, and physical access and secure deletion.
- (c)
- Distributed Systems Security: Access and identity management, data transportation, resource management and coordination of services, and data security.
- (d)
- Formal Methods for Security: Analysis and verification of security properties of systems using formal specification languages and mathematical models.
- (e)
- Authentication, Authorisation, and Accountability: Mechanisms for verifying the identities of users, controlling access to resources, and maintaining audit trails for accountability purposes.
- Software and Platform Security
- (a)
- Software Security: Language-based security techniques aimed at preventing vulnerabilities applied to system design and implementation: type systems, memory management, code generation, and others.
- (b)
- Web and Mobile Security: Security challenges specific to web and mobile applications, including secure communication protocols and protections against common threats such as CSRF, XSS, and SQL Injection.
- (c)
- Secure Software Lifecycle: Ensuring software security by integrating security software engineering techniques throughout the development lifecycle.
- Infrastructure Security
- (a)
- Applied Cryptography: Cryptographic techniques applied in securing infrastructure components.
- (b)
- Network Security: Securing network infrastructure and communications, SDN and NFV security, network access control, and zero trust networking.
- (c)
- Hardware Security: Secure element, smart card, and trusted platform module (TPM).
- (d)
- Cyber Physical Systems: Securing industrial control systems, electrical power and smart grids, autonomous vehicles, robotics, medical devices, and IoT.
- (e)
- Physical Layer and Telecommunications Security: Securing telecommunications networks and physical communication channels, NFC, air traffic communication networks, cellular networks, and others.
4.4. ACM Computing Classification System (CCS)
- General and Reference: Fundamental concepts and cross-disciplinary topics in computing.
- Hardware: Physical components and architecture of computing systems.
- Computer Systems Organisation: Organisation and structure of computer systems.
- Networks: Communication and connectivity in computing environments.
- Software and its Engineering: Development, design, and maintenance of software systems.
- Theory of Computation: Mathematical and theoretical aspects of computation.
- Mathematics of Computing: Mathematical foundations of algorithms and computation.
- Information Systems: Management, retrieval, and processing of information in computing.
- Security and Privacy: Protection of computing systems and data privacy concerns.
- Human-Centred Computing: Interaction between humans and computing technologies.
- Computing Methodologies: Methodological approaches in computing research and practice.
- Applied Computing: Application of computing techniques in various domains.
- Social and Professional Topics: Ethical, legal, and social aspects of computing.
5. Classification
5.1. Process-Based Classification: PTES and Mitre ATT&CK
5.2. Knowledge-Based Classification: NCSC CyBOK and ACM CCS
5.3. A Note on Threat Modelling Tools and Methodologies
5.4. Limitations Surrounding the Classification of Tools
6. Evaluation
6.1. Peer Review Analysis and Date of Publication
6.2. Types of Licensing and Source Code Availability
6.3. Tool Development and Maintenance
6.4. Recommendations
- Distribute the software as open source without exception and keep the software repository alive. Otherwise, it would be impossible for any dissemination within the practitioner community [152].
- Clearly specify the licence type and adopt standard FOSS licences [153], like GNU GPLv3, so that users may know precisely what they can do with the tools.
- Produce comprehensive documentation and tutorials on how to use the tools. Currently, this is partially conducted, but the existing documentation is primarily intended to support the peer-review process, as noted by Mirhosseini (2020) [154].
- Try to maintain the software by implementing bug fixes and improvements after publishing the paper. This is particularly challenging for academic projects as they operate with limited availability of human resources and funding. Once the project ends or the paper is published, the interest of the researcher tends to move to new projects [152].
- Some tools may become obsolete for several reasons: incompatibility with more recent versions of other software (OSs, libraries, applications, etc.) or the vulnerability covered by the tool being patched. In those cases, the authors should update the documentation and clearly specify the requirements, scope, context and limitations of the tool.
- Try to implement their solutions in modular tools utilised by practitioners like Metasploit and Nmap. While this can be possible for certain solutions, in general, some tools are so different and innovative that they cannot fit into the API of existing tools.
- Consider that public dissemination mitigates the risk of weaponising tools by promoting a level-playing field approach.
6.5. Related Work
7. Conclusions and Future Work
Supplementary Materials
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
ABAC | Attribute-Based Access Control |
ACL | Access Control Lists |
AE | Authenticated Encryption |
APT | Advanced Persistent Threats |
AP | Access Point |
ATT&CK | (Mitre) Adversarial Tactics, Techniques, and Common Knowledge |
C2 | Command and Control |
CBAC | Code-Based Access Control |
CI | Continuous Integration |
CLI | Command Line Interface |
CPE | Common Platform Enumeration |
CSRF | Cross Site Request Forgery |
CSS | (ACM) Computing Classification System |
CTI | Cyber Threat Intelligence |
CVE | Common Vulnerabilities and Exposures |
CVSS | Common Vulnerability Scoring System |
CWE | Common Weakness Enumeration |
CyBOK | Cyber Security Body of Knowledge |
DFBC | Digital Footprint and Breach Check |
DFD | Data Flow Diagrams |
DPI | Deep Packet Inspection |
DRL | Deep Reinforcement Learning |
DoS | Denial of Service |
E2E | End-to-End |
EH | Ethical Hacking |
ETSI | European Telecommunications Standards Institute |
FTP | File Transfer Protocol |
GAIL | Generative Adversarial Imitation Learning |
GAN | Generative Adversarial Network |
GUI | Graphical User Interface |
HARM | Hierarchical Attack Representation Model |
ICS | Industrial Control Systems |
IO2BO | Integer-Overflow-to-Buffer-Overflow |
ISAAF | Information System Security Assessment Framework |
IoMT | Internet of Medical Things |
IoT | Internet of Things |
LFA | Link Flooding Attacks |
MAC | Message Authentication Code |
MITM | Man-In-The-Middle |
NFC | Near-Field Communications |
NHS | National Health Service |
NVD | National Vulnerability Database |
OSINT | Open-Source INTelligence |
OSPF | Open Shortest Path First |
OSSTMM | Open-Source Security Testing Methodology Manuel |
OS | Operating System |
OWASP | Open Web Application Security Project |
PCI DSS | Payment Card Industry Data Security Standard |
POI | PHP Object Injection |
PTES | Penetration Testing Execution Standard |
RBAC | Role-Based Access Control |
RDP | Remote Desktop Protocol |
RL | Reinforcement Learning |
SDN | Software Defined Networking |
SDR | Software Defined Radio |
SET | Social Engineering Toolkit |
SOHO | Small Office and Home Office |
SP | Special Publication |
SQLIA | SQL Injection Attacks |
SSJI | Server-Side Javascript Injection |
TPM | Trusted Platform Module |
TTP | Tactics, Techniques, and Procedures |
UEFU | Unrestricted Executable File Upload |
UFU | Unrestricted File Upload |
VAPT | Vulnerability Assessment and Penetration Testing |
VM | Virtual Machine |
WCMS | Web Content Management Systems |
XMLi | XML injection |
XSS | Cross Site Scripting |
Appendix A. Classification
PTES Phase | Tools |
---|---|
Pre-Engagement Interactions | |
Intelligence Gathering | Bbuzz [51], DFBC [64], ESASCF [68], ESRFuzzer [69], Firmaster [71], IoTFuzzer [78], LTESniffer [83], Lore [82], MaliceScript [87], Owfuzz [103], Pyciuti [113], RT-RCT [119], SVED [128], Scanner++ [120], ShoVAT [123], SuperEye [127], TORPEDO [131], UE Security Reloaded [132], Vulcan [137], Vulnsloit [141] |
Threat Modelling | Cairis [55], ESSecA [70], HARMer [76], MAL [86], PenQuest [107], TAMELESS [129] |
Vulnerability Analysis | AIBugHunter [47], ARMONY [48], AVAIN [50], Autosploit [49], Bbuzz [51], Black Ostrich [52], Black Widow [53], Bleem [54], Censys [56], Chainsaw [57], Chucky [58], Commix [59], CryptoGuard [60], CuPerFuzzer [61], Deemon [62], Delta [63], Diane [65], EBF [66], ELAID [67], ESASCF [68], ESRFuzzer [69], FUGIO [72], FUSE [73], Firmaster [71], Gail-PT [74], HILTI [77], IoTFuzzer [78], JCOMIX [79], LAID [80], Link [81], Lore [82], Mace [84], MaliceScript [87], Masat [88], Mirage [89], Mitch [90], MoScan [91], NAUTILUS [92], NAVEX [93], No Name (CSRF) [96], No Name (TTCN-3) [97], NodeXP [99], OSV [102], ObjectMap [100], Owfuzz [103], PJCT [110], PURITY [112], PentestGPT [108], PhpSAFE [109], Project Achilles [111], Pyciuti [113], RAT [114], ROSploit [118], RT-RCT [119], Revealer [115], RiscyROP [116], Robin [117], SOA-Scanner [125], SVED [128], Scanner++ [120], SerialDetector [122], ShoVAT [123], Snout [124], Spicy [126], SuperEye [127], TChecker [130], TORPEDO [131], UE Security Reloaded [132], VAPE-BRIDGE [134], VERA [135], VUDDY [136], VulCNN [138], VulDeePecker [139], VulPecker [142], Vulcan [137], Vulnet [140], Vulnsloit [141], WAPTT [143], WebFuzz [144], WebVIM [145] |
Exploitation | Chainsaw [57], Commix [59], ELAID [67], ESASCF [68], FUGIO [72], Firmaster [71], Gail-PT [74], LAID [80], LTESniffer [83], Lore [82], MAIT [85], Mace [84], MaliceScript [87], Mirage [89], Mitch [90], NAUTILUS [92], NAVEX [93], NetCAT [94], No Name (TTCN-3) [97], NodeXP [99], OSV [102], Owfuzz [103], PURITY [112], PentestGPT [108], Pyciuti [113], ROSploit [118], Revealer [115], RiscyROP [116], Robin [117], SOA-Scanner [125], SVED [128], SerialDetector [122], Snout [124], TORPEDO [131], Untangle [133], VAPE-BRIDGE [134], Vulnsloit [141], WAPTT [143], WebVIM [145] |
Post-Exploitation | ADaMs [46], AVAIN [50], Delta [63], Diane [65], ESRFuzzer [69], GNPassGAN [75], HILTI [77], IoTFuzzer [78], Mirage [89], NeuralNetworkCracking [95], NoCrack [98], OMEN [101], OSV [102], PassGAN [104], PassGPT [105], PasswordCrackingTraining [106], Pyciuti [113], SemanticGuesser [121], Snout [124], Spicy [126], Untangle [133] |
Reporting | ESASCF [68], Firmaster [71], No Name (TTCN-3) [97], Pyciuti [113] |
Mitre ATT&CK | Tools |
---|---|
Reconnaissance | AIBugHunter [47], ARMONY [48], AVAIN [50], AVAIN [50], Autosploit [49], Bbuzz [51], Black Ostrich [52], Black Widow [53], Bleem [54], Cairis [55], Censys [56], Chainsaw [57], Chucky [58], Commix [59], CryptoGuard [60], CuPerFuzzer [61], DFBC [64], Deemon [62], Delta [63], Delta [63], Diane [65], EBF [66], ELAID [67], ESASCF [68], ESRFuzzer [69], ESSecA [70], FUGIO [72], FUSE [73], Firmaster [71], Gail-PT [74], Gail-PT [74], HILTI [77], HILTI [77], IoTFuzzer [78], JCOMIX [79], LAID [80], LTESniffer [83], Link [81], Lore [82], Mace [84], MaliceScript [87], Masat [88], Mirage [89], Mirage [89], Mitch [90], MoScan [91], NAUTILUS [92], NAVEX [93], No Name (CSRF) [96], No Name (TTCN-3) [97], No Name (TTCN-3) [97], NodeXP [99], OSV [102], ObjectMap [100], Owfuzz [103], PURITY [112], PenQuest [107], PentestGPT [108], PhpSAFE [109], Pyciuti [113], RAT [114], ROSploit [118], RT-RCT [119], RT-RCT [119], Revealer [115], RiscyROP [116], Robin [117], SOA-Scanner [125], SVED [128], Scanner++ [120], SerialDetector [122], ShoVAT [123], ShoVAT [123], Snout [124], Snout [124], Spicy [126], Spicy [126], SuperEye [127], TAMELESS [129], TChecker [130], TORPEDO [131], UE Security Reloaded [132], VAPE-BRIDGE [134], VERA [135], VUDDY [136], VulCNN [138], VulDeePecker [139], VulPecker [142], Vulcan [137], Vulnet [140], Vulnsloit [141], WAPTT [143], WebFuzz [144], WebVIM [145] |
Resource Development | AIBugHunter [47], Autosploit [49], Chucky [58], CuPerFuzzer [61], ELAID [67], ESASCF [68], HARMer [76], HILTI [77], LAID [80], MAIT [85], MAL [86], Owfuzz [103], PJCT [110], PJCT [110], Project Achilles [111], Revealer [115], Spicy [126], UE Security Reloaded [132], Untangle [133], VUDDY [136], VulCNN [138], VulPecker [142] |
Initial Access | Black Ostrich [52], Black Widow [53], Censys [56], Chainsaw [57], Commix [59], Deemon [62], ESASCF [68], ESSecA [70], FUGIO [72], FUSE [73], Firmaster [71], Gail-PT [74], JCOMIX [79], Link [81], Lore [82], MAL [86], Mace [84], MaliceScript [87], Masat [88], Mitch [90], NAUTILUS [92], NAVEX [93], NetCAT [94], No Name (CSRF) [96], NodeXP [99], OSV [102], ObjectMap [100], PURITY [112], PentestGPT [108], PhpSAFE [109], Pyciuti [113], RAT [114], Revealer [115], Robin [117], SOA-Scanner [125], SVED [128], Scanner++ [120], SerialDetector [122], ShoVAT [123], TChecker [130], TORPEDO [131], VAPE-BRIDGE [134], VERA [135], Vulcan [137], Vulnet [140], WAPTT [143], WebFuzz [144], WebVIM [145] |
Execution | Bbuzz [51], ESASCF [68], Lore [82], Mirage [89], PentestGPT [108], ROSploit [118], RiscyROP [116], SVED [128], Vulnsloit [141] |
Persistence | |
Privilege Escalation | |
Defense Evasion | |
Credential Access | ADaMs [46], Firmaster [71], GNPassGAN [75], LTESniffer [83], NeuralNetworkCracking [95], NoCrack [98], OMEN [101], PassGAN [104], PassGPT [105], PasswordCrackingTraining [106], SemanticGuesser [121] |
Discovery | AVAIN [50], Cairis [55], Firmaster [71], HILTI [77], Masat [88], PenQuest [107], RT-RCT [119], Snout [124], Spicy [126], TAMELESS [129], Vulcan [137] |
Lateral Movement | |
Collection | HILTI [77], Spicy [126] |
Command And Control | |
Exfiltration | |
Impact | Revealer [115], TORPEDO [131] |
Mitre ATT&CK | Tools |
---|---|
Collection: Adversary-In-The-Middle | HILTI [77], Spicy [126] |
Credential Access: Brute Force: Password Cracking | GNPassGAN [75], PassGAN [104], PasswordCrackingTraining [106] |
Discovery: Cloud Infrastructure Discovery | MASAT [88], VULCAN [137] |
Discovery: Network Service Discovery | AVAIN [50], Firmaster [71], HILTI [77], RT-RCT [119], Snout [124], Spicy [126] |
Enterprise: Credential Access: Brute Force | Firmaster [71] |
Enterprise: Credential Access: Network Sniffing | LTESniffer [83] |
Enterprise: Impact: Service Stop | TORPEDO [131] |
Enterprise: Initial Access: External Remote Services | NetCAT [94] |
Execution | Bbuzz [51], Lore [82], Mirage [89], PentestGPT [108], ROSploit [118], SVED [128], Vulnsloit [141] |
Execution: Inter-Process Communication | RiscyROP [116] |
Gather Victim Network Information | Lore [82], PentestGPT [108], SVED [128] |
Impact: Endpoint Denial Of Service | Revealer [115] |
Initial Access | Gail-PT [74], Lore [82], OSV [102], PentestGPT [108], SVED [128] |
Initial Access: Exploit Public-Facing Application | Commix [59], JCOMIX [79], Mitch [90], No Name (CSRF) [96], PURITY [112], Puciuty [113], Robin [117], Vulnet [140], WebVIM [145], ZGrab [56] |
Initial Access: Exploit Public-Facing Application | WAPTT [143] |
Initial Access: Exploit Public-Facing Application | Black Ostrich [52], Black Widow [53], Chainsaw [57], Deemon [62], FUGIO [72], FUSE [73], Firmaster [71], Link [81], MASAT [88], Mace [84], MaliceScript [87], NAUTILUS [92], NAVEX [93], NodeXP [99], ObjectMap [100], PhpSAFE [109], Revealer [115], SOA-Scanner [125], Scanner++ [120], SerialDetector [122], ShoVAT [123], TChecker [130], TORPEDO [131], VAPE-BRIDGE [134], VERA [135], VULCAN [137], WebFuzz [144] |
Reconnaissance: Active Scanning | LTESniffer [83], TORPEDO [131] |
Reconnaissance: Active Scanning: Vulnerability Scanning | NodeXP [99] |
Reconnaissance: Active Scanning: Vulnerability Scanning | AIBugHunter [47], ARMONY [48], AVAIN [50], Autosploit [49], Bbuzz [51], Black Ostrich [52], Black Widow [53], Chainsaw [57], Chucky [58], Commix [59], CryptoGuard [60], CuPerFuzzer [61], DELTA [63], DIANE [65], Deemon [62], EBF [66], ELAID [67], ESRFuzzer [69], FUGIO [72], FUSE [73], Firmaster [71], Gail-PT [74], HILTI [77], IoTFuzzer [78], JCOMIX [79], LAID [80], Link [81], Lore [82], MASAT [88], Mace [84], MaliceScript [87], Mirage [89], Mitch [90], NAUTILUS [92], NAVEX [93], No Name (CSRF) [96], No Name (TTCN-3) [97], OSV [102], ObjectMap [100], Owfuzz [103], PURITY [112], PentestGPT [108], PhpSAFE [109], Puciuty [113], ROSploit [118], RT-RCT [119], Revealer [115], RiscyROP [116], Robin [117], SOA-Scanner [125], SVED [128], Scanner++ [120], SerialDetector [122], ShoVAT [123], Snout [124], Spicy [126], SuperEye [127], TChecker [130], UE Security Reloaded [132], VAPE-BRIDGE [134], VERA [135], VUDDY [136], VULCAN [137], VulCNN [138], VulDeePecker [139], VulPecker [142], Vulnet [140], Vulnsloit [141], WAPTT [143], WebFuzz [144], WebVIM [145], ZGrab [56] |
Reconnaissance: Gather Victim Identity Information | DFBC [64] |
Reconnaissance: Gather Victim Network Information | AVAIN [50], DELTA [63], Gail-PT [74], HILTI [77], MaliceScript [87], Mirage [89], Puciuty [113], RT-RCT [119], ShoVAT [123], Snout [124], Spicy [126] |
Reconnaissance: Gather Victim Network Information: Network Topology | No Name (TTCN-3) [97] |
Reconnaissance: Resource Development | HARMer [76] |
Resource Development: Develop Capabilities | HILTI [77], PICT [110], Spicy [126] |
Resource Development: Develop Capabilities: Exploits | ELAID [67], LAID [80], Owfuzz [103], Project Achilles [111], UE Security Reloaded [132], VulCNN [138] |
Resource Development: Develop Capabilities: Malware | MAIT [85] |
Resource Development: Obtain Capabilities: Exploits | AIBugHunter [47], Autosploit [49], Chucky [58], CuPerFuzzer [61], PICT [110], Revealer [115], VUDDY [136], VulPecker [142] |
CyBOK | Tools |
---|---|
Attacks & Defences: Adversarial Behaviours | Cairis [55], ESASCF [68], ESSecA [70], HARMer [76], Lore [82], MAL [86], PenQuest [107], PenQuest [107], SVED [128], TAMELESS [129] |
Attacks & Defences: Malware & Attack Technology: Malware Analysis: Analysis Techniques: Static Analysis/Dynamic Analysis | MAIT [85] |
Human, Organisational & Regulatory Aspects: Human Factors | ESSecA [70], TAMELESS [129] |
Human, Organisational & Regulatory Aspects: Privacy & Online Rights: Privacy Engineering: Privacy Evaluation | DFBC [64] |
Infrastructure Security: Applied Cryptography: Cryptographic Implementation: Api Design For Cryptographic Libraries | CryptoGuard [60] |
Infrastructure Security: Applied Cryptography: Cryptographic Implementation: Cryptographic Libraries | Firmaster [71] |
Infrastructure Security: Cyber Physical Systems | ESSecA [70], TAMELESS [129] |
Infrastructure Security: Network Security | AVAIN [50], Cairis [55], Delta [63], ESASCF [68], Gail-PT [74], HARMer [76], HILTI [77], Lore [82], Masat [88], NetCAT [94], SVED [128], Spicy [126] |
Infrastructure Security: Network Security: Network Protocols And Their Security | OSV [102], SuperEye [127], Vulnsloit [141] |
Infrastructure Security: Network Security: Network Protocols And Their Security: Security At The Internet Layer | Bbuzz [51] |
Infrastructure Security: Network Security: Network Protocols And Their Security: Security At The Internet Layer: Ipv6 Security | No Name (TTCN-3) [97] |
Infrastructure Security: Network Security: Networking Applications | Vulcan [137] |
Infrastructure Security: Network Security: Networking Applications: Local Area Networks | ESRFuzzer [69], Firmaster [71], HILTI [77], No Name (TTCN-3) [97], Pyciuti [113], Spicy [126] |
Infrastructure Security: Network Security: Networking Applications: Wireless Networks | ESRFuzzer [69], Firmaster [71], LTESniffer [83], Owfuzz [103], RT-RCT [119], Snout [124], UE Security Reloaded [132] |
Infrastructure Security: Network Security: Other Network Security Topics: Cloud And Data Center Security | Masat [88], Vulcan [137] |
Infrastructure Security: Network Security: Software-Defined Networking And Network Function Virtualization | Delta [63] |
Infrastructure Security: Physical Layer & Telecommunications Security: Identification: Attacks On Physical Layer Identification | Snout [124] |
Operating Systems & Virtualization Security: Operating System Hardening | ROSploit [118] |
Physical Layer & Telecommunications Security: Physical Layer Security Of Selected Communication Technologies: Cellular Networks: 4G (Lte) | LTESniffer [83] |
Physical Layer & Telecommunications Security: Physical Layer Security Of Selected Communication Technologies: Cellular Networks: 5G | UE Security Reloaded [132] |
Resource Development: Develop Capabilities: Exploits | ESASCF [68] |
Software And Platform Security: Software Security: Categories Of Vulnerabilities: Memory Management Vulnerabilities | ARMONY [48], ELAID [67], IoTFuzzer [78], LAID [80], WAPTT [143] |
Software And Platform Security: Software Security: Detection Of Vulnerabilities | ARMONY [48], AVAIN [50], Autosploit [49], Bbuzz [51], Black Ostrich [52], Black Widow [53], Cairis [55], Censys [56], Chainsaw [57], Commix [59], CryptoGuard [60], Deemon [62], EBF [66], ESASCF [68], FUGIO [72], FUSE [73], Firmaster [71], HILTI [77], JCOMIX [79], Link [81], Mace [84], MaliceScript [87], Mirage [89], Mitch [90], MoScan [91], NAUTILUS [92], NAVEX [93], No Name (CSRF) [96], No Name (TTCN-3) [97], NodeXP [99], OSV [102], ObjectMap [100], Owfuzz [103], PJCT [110], PURITY [112], PentestGPT [108], Project Achilles [111], Pyciuti [113], RAT [114], ROSploit [118], RT-RCT [119], Revealer [115], SOA-Scanner [125], Scanner++ [120], SerialDetector [122], ShoVAT [123], Snout [124], Spicy [126], SuperEye [127], TChecker [130], TORPEDO [131], UE Security Reloaded [132], VAPE-BRIDGE [134], VERA [135], VulDeePecker [139], Vulcan [137], Vulnet [140], Vulnsloit [141], WAPTT [143], WebFuzz [144], WebVIM [145] |
Software And Platform Security: Software Security: Detection Of Vulnerabilities: Dynamic Detection | Bbuzz [51], Black Ostrich [52], CuPerFuzzer [61], Diane [65], EBF [66], Project Achilles [111] |
Software And Platform Security: Software Security: Detection Of Vulnerabilities: Dynamic Detection: Black-Box Fuzzing | Bleem [54], Delta [63], IoTFuzzer [78], Owfuzz [103] |
Software And Platform Security: Software Security: Detection Of Vulnerabilities: Dynamic Detection: Generating Relevant Executions: Dynamic Symbolic Execution | RiscyROP [116] |
Software And Platform Security: Software Security: Detection Of Vulnerabilities: Static Detection | AIBugHunter [47], Chucky [58], ELAID [67], LAID [80], PhpSAFE [109], Untangle [133], VUDDY [136], VulCNN [138], VulPecker [142] |
Software And Platform Security: Software Security: Dynamic Detection | WebFuzz [144] |
Software And Platform Security: Software Security: Side-Channel Vulnerabilities | NetCAT [94] |
Software And Platform Security: Web & Mobile Security | Black Ostrich [52], EBF [66], Mace [84], MoScan [91], NAUTILUS [92], NAVEX [93], RAT [114], Revealer [115], Robin [117], Scanner++ [120], ShoVAT [123], VAPE-BRIDGE [134] |
Software And Platform Security: Web & Mobile Security: Client Side Vulnerabilities And Mitigations | MaliceScript [87] |
Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations | Censys [56], PURITY [112], Pyciuti [113], Robin [117], SOA-Scanner [125], TORPEDO [131], VERA [135], Vulnet [140] |
Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations: Injection Vulnerabilities | Commix [59], FUGIO [72], ObjectMap [100], SerialDetector [122] |
Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations: Injection Vulnerabilities: Command Injection | JCOMIX [79], NodeXP [99] |
Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations: Injection Vulnerabilities: Cross-Site Request Forgery (Csrf) | Deemon [62], Mitch [90], No Name (CSRF) [96] |
Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations: Injection Vulnerabilities: Cross-Site Scripting (Xss) | Black Widow [53], Chainsaw [57], PhpSAFE [109], TChecker [130], WAPTT [143], WebFuzz [144] |
Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations: Injection Vulnerabilities: Cross-Site Scripting (Xss): Reflected Xss | Link [81] |
Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations: Injection Vulnerabilities: Sql-Injection | Chainsaw [57], PhpSAFE [109], TChecker [130], WAPTT [143], WebVIM [145] |
Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations: Injection Vulnerabilities: User Uploaded Files | FUSE [73] |
Systems Security: Authentication, Authorisation & Accountability: Authentication: Passwords | ADaMs [46], GNPassGAN [75], NeuralNetworkCracking [95], NoCrack [98], OMEN [101], PassGAN [104], PassGPT [105], PasswordCrackingTraining [106], SemanticGuesser [121] |
Systems Security: Distributed Systems Security | Cairis [55], MAL [86], PenQuest [107] |
ACM CCS | Tools |
---|---|
Hardware: Emerging Technologies: Analysis And Design Of Emerging Devices And Systems: Emerging Architectures | AVAIN [50], Diane [65], EBF [66], IoTFuzzer [78], Mirage [89], ROSploit [118], RT-RCT [119], Snout [124] |
Human-Centered Computing: Human Computer Interaction (Hci): Interactive Systems And Tools | TAMELESS [129] |
Networks: Network Components: Intermediate Nodes: Routers | ESRFuzzer [69] |
Networks: Network Protocols: Network Layer Protocols: Routing Protocols | No Name (TTCN-3) [97], OSV [102] |
Security And Privacy: Cryptography | EBF [66] |
Security And Privacy: Human And Societal Aspects Of Security And Privacy | DFBC [64] |
Security And Privacy: Intrusion/Anomaly Detection And Malware Mitigation: Malware And Its Mitigation | MAIT [85] |
Security And Privacy: Network Security | AVAIN [50], Bbuzz [51], Censys [56], NetCAT [94], No Name (TTCN-3) [97], OSV [102], Pyciuti [113], RT-RCT [119], SuperEye [127], Vulcan [137], Vulnsloit [141] |
Security And Privacy: Network Security: Mobile And Wireless Security | ESRFuzzer [69], Firmaster [71], LTESniffer [83], Owfuzz [103], Scanner++ [120], Snout [124], UE Security Reloaded [132] |
Security And Privacy: Network Security: Security Protocols | HILTI [77], No Name (TTCN-3) [97], Spicy [126] |
Security And Privacy: Network Security: Web Protocol Security | Bbuzz [51] |
Security And Privacy: Security Services: Authorisation | ADaMs [46], GNPassGAN [75], NeuralNetworkCracking [95], NoCrack [98], OMEN [101], PassGAN [104], PassGPT [105], PasswordCrackingTraining [106], SemanticGuesser [121] |
Security And Privacy: Software And Application Security | CryptoGuard [60], VulDeePecker [139] |
Security And Privacy: Software And Application Security: Domain-Specific Security And Privacy Architectures | ESSecA [70], MAL [86], PenQuest [107] |
Security And Privacy: Software And Application Security: Software Reverse Engineering | RiscyROP [116], VulCNN [138] |
Security And Privacy: Software And Application Security: Software Security Engineering | AIBugHunter [47], Chucky [58], CuPerFuzzer [61], ELAID [67], LAID [80], PJCT [110], Project Achilles [111], Untangle [133], VUDDY [136], VulPecker [142] |
Security And Privacy: Software And Application Security: Web Applications Security | Black Ostrich [52], Black Widow [53], Censys [56], Chainsaw [57], Commix [59], Deemon [62], FUGIO [72], FUSE [73], JCOMIX [79], Link [81], Mace [84], MaliceScript [87], Mitch [90], MoScan [91], NAUTILUS [92], NAVEX [93], No Name (CSRF) [96], NodeXP [99], ObjectMap [100], PURITY [112], PhpSAFE [109], Pyciuti [113], RAT [114], Robin [117], SOA-Scanner [125], SerialDetector [122], ShoVAT [123], TChecker [130], TORPEDO [131], VAPE-BRIDGE [134], VERA [135], Vulnet [140], WAPTT [143], WebFuzz [144], WebVIM [145] |
Security And Privacy: Systems Security: Denial Of Service Attacks | Revealer [115] |
Security And Privacy: Systems Security: Distributed Systems Security | MAL [86], PenQuest [107] |
Security And Privacy: Systems Security: Vulnerability Management: Penetration Testing | Cairis [55], Diane [65], ESASCF [68], ESSecA [70], Gail-PT [74], HARMer [76], Lore [82], MAL [86], Mirage [89], PenQuest [107], PentestGPT [108], Pyciuti [113], SVED [128], TAMELESS [129] |
Security And Privacy: Systems Security: Vulnerability Management: Vulnerability Scanners | AIBugHunter [47], ARMONY [48], AVAIN [50], Autosploit [49], Black Ostrich [52], Black Widow [53], Bleem [54], Censys [56], Chainsaw [57], Chucky [58], Commix [59], CryptoGuard [60], CuPerFuzzer [61], Deemon [62], Delta [63], EBF [66], ELAID [67], ESSecA [70], FUGIO [72], FUSE [73], Firmaster [71], HILTI [77], IoTFuzzer [78], JCOMIX [79], LAID [80], Link [81], Mace [84], MaliceScript [87], Masat [88], Mitch [90], MoScan [91], NAUTILUS [92], NAVEX [93], No Name (CSRF) [96], No Name (TTCN-3) [97], NodeXP [99], OSV [102], ObjectMap [100], Owfuzz [103], PJCT [110], PURITY [112], PhpSAFE [109], Project Achilles [111], Pyciuti [113], RAT [114], ROSploit [118], RT-RCT [119], Revealer [115], RiscyROP [116], Robin [117], SOA-Scanner [125], Scanner++ [120], SerialDetector [122], ShoVAT [123], Snout [124], Spicy [126], SuperEye [127], TChecker [130], TORPEDO [131], UE Security Reloaded [132], Untangle [133], VAPE-BRIDGE [134], VERA [135], VUDDY [136], VulCNN [138], VulDeePecker [139], VulPecker [142], Vulcan [137], Vulnet [140], Vulnsloit [141], WAPTT [143], WebFuzz [144], WebVIM [145] |
References
- Duque Anton, S.D.; Fraunholz, D.; Schneider, D. Investigating the Ecosystem of Offensive Information Security Tools. arXiv 2020, arXiv:2012.08811. [Google Scholar] [CrossRef]
- Leal, M.M.; Musgrave, P. Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity. Contemp. Secur. Policy 2023, 44, 437–461. [Google Scholar] [CrossRef]
- Valenza, A.; Costa, G.; Armando, A. Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners. In Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Online, 14–16 October 2020; pp. 17–29. [Google Scholar] [CrossRef]
- Denis, M.; Zena, C.; Hayajneh, T. Penetration testing: Concepts, attack methods, and defense strategies. In Proceedings of the 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA, 29 April 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Yaacoub, J.P.A.; Noura, H.N.; Salman, O.; Chehab, A. Ethical hacking for IoT: Security issues, challenges, solutions and recommendations. Internet Things -Cyber-Phys. Syst. 2023, 3, 280–308. [Google Scholar] [CrossRef]
- Aarya, P.S.; Rajan, A.; Sachin, K.P.S.; Gopi, R.; Sreenu, G. Web Scanning: Existing Techniques and Future. In Proceedings of the 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 14–15 June 2018; pp. 123–128. [Google Scholar] [CrossRef]
- Altulaihan, E.A.; Alismail, A.; Frikha, M. A Survey on Web Application Penetration Testing. Electronics 2023, 12, 1229. [Google Scholar] [CrossRef]
- Shanley, A.; Johnstone, M.N. Selection of Penetration Testing Methodologies: A Comparison and Evaluation; SRI Security Research Institute: Menlo Park, CA, USA, 2015. [Google Scholar] [CrossRef]
- PTES Working Group. The Penetration Testing Execution Standard; PTES Working Group: London, UK, 2011. [Google Scholar]
- Strom, B.E.; Applebaum, A.; Miller, D.P.; Nickels, K.C.; Pennington, A.G.; Thomas, C.B. Mitre att&ck: Design and Philosophy; Technical Report; The MITRE Corporation: McLean, VA, USA, 2018. [Google Scholar]
- Rashid, A.; Chivers, H.; Danezis, G.; Lupu, E.; Martin, A. (Eds.) Cyber Security Body of Knowledge, version 1.1.0; The National Cyber Security Centre: London, UK, 2021. [Google Scholar]
- Rous, B. Major update to ACM’s Computing Classification System. Commun. ACM 2012, 55, 12. [Google Scholar] [CrossRef]
- Bishop, M. Computer Security: Art and Science; Pearson Education: London, UK, 2018. [Google Scholar]
- Yaacoub, J.A.; Noura, H.N.; Salman, O.; Chehab, A. A Survey on Ethical Hacking: Issues and Challenges. arXiv 2021, arXiv:2103.15072. [Google Scholar] [CrossRef]
- Walker, M. CEH Certified Ethical Hacker All-in-One Exam Guide, 5th ed.; McGraw Hill LLC: New York, NY, USA, 2021. [Google Scholar]
- Hald, S.L.N.; Pedersen, J.M. An updated taxonomy for characterizing hackers according to their threat properties. In Proceedings of the 2012 14th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Republic of Korea, 19–22 February 2012; pp. 81–86. [Google Scholar]
- Oliver, D.; Randolph, A.B. Hacker Definitions in Information Systems Research. J. Comput. Inf. Syst. 2022, 62, 397–409. [Google Scholar] [CrossRef]
- Aljaidi, M.; Alsarhan, A.; Samara, G.; Alazaidah, R.; Almatarneh, S.; Khalid, M.; Al-Gumaei, Y.A. NHS WannaCry Ransomware Attack: Technical Explanation of The Vulnerability, Exploitation, and Countermeasures. In Proceedings of the 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI), Zarqa, Jordan, 6–8 December 2022; pp. 1–6. [Google Scholar] [CrossRef]
- Qin, M.; Mogos, G. Cyber-attacks on SWIFT Systems of financial institutions. In Proceedings of the 5th International Conference on Computer Science and Software Engineering, Guilin, China, 21–23 October 2022; pp. 596–599. [Google Scholar] [CrossRef]
- Fidler, D.P. The US election hacks, cybersecurity, and international law. Am. J. Int. Law 2016, 110, 337–342. [Google Scholar]
- Steffens, T. Attribution of Advanced Persistent Threats—How to Identify the Actors Behind Cyber-Espionage; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar] [CrossRef]
- Liu, Z.; Chen, C.; Zhang, L.Y.; Gao, S. Working Mechanism of Eternalblue and Its Application in Ransomworm. In Lecture Notes in Computer Science; Springer International Publishing: Berlin/Heidelberg, Germany, 2022; pp. 178–191. [Google Scholar] [CrossRef]
- Concil of Europe. Convention on Cybercrime; European Treaty Series—No. 185; Council of Europe: Strasbourg, France, 2001. [Google Scholar]
- Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on Attacks against Information Systems and Replacing Council Framework Decision 2005/222/JHA; Council of the European Union; European Parliament: Brussels, Belgium, 2013.
- Computer Misuse Act 1990; United Kingdom Parliament: London, UK, 1990.
- Gehring, V.V. The Internet in Public Life; Rowman & Littlefield: Lanham, ML, USA, 2004. [Google Scholar]
- Jaquet-Chiffelle, D.O.; Loi, M. Ethical and unethical hacking. Ethics Cybersecur. 2020, 21, 179–204. [Google Scholar] [CrossRef]
- MITRE. Common Vulnerabilities and Exposures; The MITRE Corporation: McLean, VA, USA, 2024. [Google Scholar]
- MITRE. Common Weakness Enumeration; The MITRE Corporation: McLean, VA, USA, 2024. [Google Scholar]
- Payment Card Industry Data Security Standard: Requirements and Testing Procedures; v4.0; PCI Security Standards Council: Wakefield, MA, USA, 2022.
- PCI Data Security Standard—Penetration Testing Guidance; PCI Security Standards Council: Wakefield, MA, USA, 2017.
- Rathore, B.; Brunner, M.; Dilaj, M.; Herrera, O.; Brunati, P.; Subramaniam, R.; Raman, S.; Chavan, U. Information systems security assessment framework (issaf). Draft 0.2 B 2006, 1, 2006. [Google Scholar]
- Herzog, P. The Open Source Security Testing Methodology Manual; ISECOM: Barcelona, Spain, 2010. [Google Scholar]
- Scarfone, K.A.; Souppaya, M.P.; Cody, A.; Orebaugh, A.D. SP 800-115; Technical guide to information security testing and assessment. National Institute of Standards and Technology: Gaithersburg, MD, USA, 2008.
- Cerullo, F.E. OWASP TOP 10 2009. In Web Application Security; Serrão, C., Aguilera Díaz, V., Cerullo, F., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; p. 19. [Google Scholar] [CrossRef]
- Meucci, M.; Muller, A. OWASP Testing Guide; v4.0; OWASP: Wakefield, MA, USA, 2014. [Google Scholar]
- Moher, D.; Shamseer, L.; Clarke, M.; Ghersi, D.; Liberati, A.; Petticrew, M.; Shekelle, P.; Stewart, L.A.; Group, P.P. Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) 2015 statement. Syst. Rev. 2015, 4, 1. [Google Scholar] [CrossRef] [PubMed]
- Astrida, D.N.; Saputra, A.R.; Assaufi, A.I. Analysis and Evaluation of Wireless Network Security with the Penetration Testing Execution Standard (PTES). Sink. J. Dan Penelit. Tek. Inform. 2022, 7, 147–154. [Google Scholar] [CrossRef]
- Rajesh, P.; Alam, M.; Tahernezhadi, M.; Monika, A.; Chanakya, G. Analysis of cyber threat detection and emulation using mitre attack framework. In Proceedings of the 2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA), San Antonio, TX, USA, 5–7 September 2022; pp. 4–12. [Google Scholar] [CrossRef]
- Georgiadou, A.; Mouzakitis, S.; Askounis, D. Assessing mitre att&ck risk using a cyber-security culture framework. Sensors 2021, 21, 3267. [Google Scholar] [CrossRef] [PubMed]
- Messinis, S.; Temenos, N.; Protonotarios, N.E.; Rallis, I.; Kalogeras, D.; Doulamis, N. Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review. Comput. Biol. Med. 2024, 108036. [Google Scholar] [CrossRef] [PubMed]
- Alexander, O.; Belisle, M.; Steele, J. MITRE ATT&CK for Industrial Control Systems: Design and Philosophy; The MITRE Corporation: Bedford, MA, USA, 2020; Volume 29. [Google Scholar]
- Williams, L. The Cyber Security Body of Knowledge; v1.1.0; Chapter Secure Software Lifecycle; KA Version 1.0.2; University of Bristol: Bristol, UK, 2021. [Google Scholar]
- Nautiyal, L.; Rashid, A.; Hallett, J.; Shreeve, B. The UK’s Cyber Security Degree Certification Programme: A CyBOK Case Study; Technical Report; University of Essex: Colchester, UK, 2020. [Google Scholar]
- Attwood, S.; Williams, A. Exploring the UK Cyber Skills Gap through a mapping of active job listings to the Cyber Security Body of Knowledge (CyBOK). In Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, Oulu, Finland, 14–16 June 2023; pp. 273–278. [Google Scholar] [CrossRef]
- Pasquini, D.; Cianfriglia, M.; Ateniese, G.; Bernaschi, M. Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. In Proceedings of the 30th USENIX Security Symposium, USENIX Security 2021, Online, 11–13 August 2021; Bailey, M.D., Greenstadt, R., Eds.; USENIX Association: Berkeley, CA, USA, 2021; pp. 821–838. [Google Scholar]
- Fu, M.; Tantithamthavorn, C.; Le, T.; Kume, Y.; Nguyen, V.; Phung, D.; Grundy, J. AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities. Empir. Softw. Eng. 2023, 29, 4. [Google Scholar] [CrossRef]
- Chen, L.H.; Hsu, F.H.; Hwang, Y.; Su, M.C.; Ku, W.S.; Chang, C.H. ARMORY: An automatic security testing tool for buffer overflow defect detection. Comput. Electr. Eng. 2013, 39, 2233–2242. [Google Scholar] [CrossRef]
- Moscovich, N.; Bitton, R.; Mallah, Y.; Inokuchi, M.; Yagyu, T.; Kalech, M.; Elovici, Y.; Shabtai, A. Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities. arXiv 2020, arXiv:2007.00059. [Google Scholar] [CrossRef]
- Egert, R.; Grube, T.; Born, D.; Mühlhäuser, M. AVAIN—A Framework for Automated Vulnerability Indication for the IoT in IP-based Networks. In Proceedings of the 2019 International Conference on Networked Systems, NetSys 2019, Munich, Germany, 18–21 March 2019; pp. 1–3. [Google Scholar] [CrossRef]
- Blumbergs, B.; Vaarandi, R. Bbuzz: A bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis. In Proceedings of the 2017 IEEE Military Communications Conference, MILCOM 2017, Baltimore, MD, USA, 23–25 October 2017; pp. 707–712. [Google Scholar] [CrossRef]
- Eriksson, B.; Stjerna, A.; De Masellis, R.; Rüemmer, P.; Sabelfeld, A. Black Ostrich: Web Application Scanning with String Solvers. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark, 26–30 November 2023. [Google Scholar] [CrossRef]
- Eriksson, B.; Pellegrino, G.; Sabelfeld, A. Black Widow: Blackbox Data-driven Web Scanning. In Proceedings of the 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24–27 May 2021; pp. 1125–1142. [Google Scholar] [CrossRef]
- Luo, Z.; Yu, J.; Zuo, F.; Liu, J.; Jiang, Y.; Chen, T.; Roychoudhury, A.; Sun, J. Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations. In Proceedings of the 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, 9–11 August 2023; Calandrino, J.A., Troncoso, C., Eds.; USENIX Association: Berkeley, CA, USA, 2023; pp. 4481–4498. [Google Scholar]
- Faily, S.; Scandariato, R.; Shostack, A.; Sion, L.; Ki-Aries, D. Contextualisation of Data Flow Diagrams for Security Analysis. In Proceedings of the Graphical Models for Security—7th International Workshop, GraMSec 2020, Boston, MA, USA, 22 June 2020; Springer: Berlin/Heidelberg, Germany, 2020; Volume 12419, pp. 186–197. [Google Scholar] [CrossRef]
- Durumeric, Z.; Adrian, D.; Mirian, A.; Bailey, M.; Halderman, J.A. A Search Engine Backed by Internet-Wide Scanning. In Proceedings of the 22nd ACM Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015; pp. 542–553. [Google Scholar] [CrossRef]
- Alhuzali, A.; Eshete, B.; Gjomemo, R.; Venkatakrishnan, V.N. Chainsaw: Chained Automated Workflow-based Exploit Generation. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S., Eds.; ACM: New York, NY, USA, 2016; pp. 641–652. [Google Scholar] [CrossRef]
- Yamaguchi, F.; Wressnegger, C.; Gascon, H.; Rieck, K. Chucky: Exposing missing checks in source code for vulnerability discovery. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, 4–8 November 2013; Sadeghi, A., Gligor, V.D., Yung, M., Eds.; ACM: New York, NY, USA, 2013; pp. 499–510. [Google Scholar] [CrossRef]
- Stasinopoulos, A.; Ntantogian, C.; Xenakis, C. Commix: Automating evaluation and exploitation of command injection vulnerabilities in Web applications. Int. J. Inf. Sec. 2019, 18, 49–72. [Google Scholar] [CrossRef]
- Rahaman, S.; Xiao, Y.; Afrose, S.; Shaon, F.; Tian, K.; Frantz, M.; Kantarcioglu, M.; Yao, D.D. CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, 11–15 November 2019; Cavallaro, L., Kinder, J., Wang, X., Katz, J., Eds.; ACM: New York, NY, USA, 2019; pp. 2455–2472. [Google Scholar] [CrossRef]
- Li, R.; Diao, W.; Li, Z.; Du, J.; Guo, S. Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings. In Proceedings of the 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24–27 May 2021; pp. 70–86. [Google Scholar] [CrossRef]
- Pellegrino, G.; Johns, M.; Koch, S.; Backes, M.; Rossow, C. Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, 30 October–3 November 2017; Thuraisingham, B., Evans, D., Malkin, T., Xu, D., Eds.; ACM: New York, NY, USA, 2017; pp. 1757–1771. [Google Scholar] [CrossRef]
- Lee, S.; Yoon, C.; Lee, C.; Shin, S.; Yegneswaran, V.; Porras, P.A. Delta: A security assessment framework for software-defined networks. In Proceedings of the NDSS, San Diego, CA, USA, 26 February–1 March 2017. [Google Scholar] [CrossRef]
- Ng, C.K.; Yusof, Y.; Ab Aziz, N.S.N. DFBC Recon Tool: Digital Footprint and Breach Check Reconnaissance Tool. In Proceedings of the 2021 14th International Conference on Developments in eSystems Engineering (DeSE). Sharjah, United Arab Emirates, 7–10 December 2021; pp. 526–530. [Google Scholar] [CrossRef]
- Redini, N.; Continella, A.; Das, D.; De Pasquale, G.; Spahn, N.; Machiry, A.; Bianchi, A.; Kruegel, C.; Vigna, G. Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 24–27 May 2021; pp. 484–500. [Google Scholar] [CrossRef]
- Aljaafari, F.; Menezes, R.; Mustafa, M.A.; Cordeiro, L.C. Finding Security Vulnerabilities in IoT Cryptographic Protocol and Concurrent Implementations. arXiv 2021. [Google Scholar] [CrossRef]
- Xu, L.; Xu, M.; Li, F.; Huo, W. ELAID: Detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis. Cybersecurity 2020, 3, 1–19. [Google Scholar] [CrossRef]
- Ghanem, M.C.; Chen, T.M.; Ferrag, M.A.; Kettouche, M.E. ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance. IEEE Access 2023, 11, 129840–129853. [Google Scholar] [CrossRef]
- Zhang, Y.; Huo, W.; Jian, K.; Shi, J.; Liu, L.; Zou, Y.; Zhang, C.; Liu, B. ESRFuzzer: An enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities. Cybersecurity 2021, 4, 24. [Google Scholar] [CrossRef]
- Rak, M.; Salzillo, G.; Granata, D. ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems. Comput. Electr. Eng. 2022, 99, 107721. [Google Scholar] [CrossRef]
- Visoottiviseth, V.; Jutadhammakorn, P.; Pongchanchai, N.; Kosolyudhthasarn, P. Firmaster: Analysis Tool for Home Router Firmware. In Proceedings of the 2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE), Nakhon Pathom, Thailand, 11–13 July 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Park, S.; Kim, D.; Jana, S.; Son, S. FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities. In Proceedings of the 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, 10–12 August 2022; Butler, K.R.B., Thomas, K., Eds.; USENIX Association: Berkeley, CA, USA, 2022; pp. 197–214. [Google Scholar]
- Lee, T.; Wi, S.; Lee, S.; Son, S. FUSE: Finding File Upload Bugs via Penetration Testing. In Proceedings of the 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, CA, USA, 23–26 February 2020. [Google Scholar] [CrossRef]
- Chen, J.; Hu, S.; Zheng, H.; Xing, C.; Zhang, G. GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning. Comput. Secur. 2023, 126, 103055. [Google Scholar] [CrossRef]
- Yu, F.; Martin, M.V. GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing. In Proceedings of the 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy, 6–10 June 2022. [Google Scholar] [CrossRef]
- Enoch, S.Y.; Huang, Z.; Moon, C.Y.; Lee, D.; Ahn, M.K.; Kim, D.S. HARMer: Cyber-Attacks Automation and Evaluation. IEEE Access 2020, 8, 129397–129414. [Google Scholar] [CrossRef]
- Sommer, R.; Vallentin, M.; De Carli, L.; Paxson, V. HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis. In Proceedings of the 2014 Conference on Internet Measurement Conference, Vancouver, BC, Canada, 5–7 November 2014. [Google Scholar] [CrossRef]
- Chen, J.; Diao, W.; Zhao, Q.; Zuo, C.; Lin, Z.; Wang, X.; Lau, W.C.; Sun, M.; Yang, R.; Zhang, K. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. In Proceedings of the 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, CA, USA, 18–21 February 2018. [Google Scholar] [CrossRef]
- Stallenberg, D.M.; Panichella, A. JCOMIX: A search-based tool to detect XML injection vulnerabilities in web applications. In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Tallinn, Estonia, 26–30 August 2019; pp. 1090–1094. [Google Scholar] [CrossRef]
- Xu, M.; Li, S.; Xu, L.; Li, F.; Huo, W.; Ma, J.; Li, X.; Huang, Q. A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection. In Proceedings of the Information Security and Cryptology—14th International Conference, Inscrypt 2018, Fuzhou, China, 14–17 December 2018; Guo, F., Huang, X., Yung, M., Eds.; Revised Selected Papers; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2018; Volume 11449, pp. 404–423. [Google Scholar] [CrossRef]
- Lee, S.; Wi, S.; Son, S. Link: Black-box detection of cross-site scripting vulnerabilities using reinforcement learning. In Proceedings of the ACM Web Conference 2022, Lyon, France, 25–29 April 2022; pp. 743–754. [Google Scholar] [CrossRef]
- Holm, H. Lore a Red Team Emulation Tool. IEEE Trans. Dependable Secur. Comput. 2023, 20, 1596–1608. [Google Scholar] [CrossRef]
- Hoang, T.D.; Park, C.; Son, M.; Oh, T.; Bae, S.; Ahn, J.; Oh, B.; Kim, Y. LTESniffer: An Open-Source LTE Downlink/Uplink Eavesdropper. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Guildford, UK, 29 May–1 June 2023; pp. 43–48. [Google Scholar] [CrossRef]
- Monshizadeh, M.; Naldurg, P.; Venkatakrishnan, V.N. Mace: Detecting privilege escalation vulnerabilities in web applications. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; pp. 690–701. [Google Scholar] [CrossRef]
- Yucel, C.; Lockett, A.; Chalkias, I.; Mallis, D.; Katos, V. MAIT: Malware Analysis and Intelligence Tool. Inf. Secur. 2021, 50, 49–65. [Google Scholar] [CrossRef]
- Johnson, P.; Lagerström, R.; Ekstedt, M. A meta-language for threat modelling and attack simulations. In Proceedings of the 13th International Conference on Availability, Reliability and Security, University of Hamburg, Germany, 27–30 August 2018; pp. 1–8. [Google Scholar] [CrossRef]
- Liu, C.; Cui, X.; Wang, Z.; Wang, X.; Feng, Y.; Li, X. Malicescript: A novel browser-based intranet threat. In Proceedings of the 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), Guangzhou, China, 18–21 June 2018; pp. 219–226. [Google Scholar] [CrossRef]
- Mjihil, O.; Kim, D.S.; Haqiq, A. Masat: Model-based automated security assessment tool for cloud computing. In Proceedings of the 2015 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14–16 December 2015; pp. 97–103. [Google Scholar] [CrossRef]
- Cayre, R.; Nicomette, V.; Auriol, G.; Alata, E.; Kaaniche, M.; Marconato, G. Mirage: Towards a metasploit-like framework for iot. In Proceedings of the 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Berlin, Germany, 28–31 October 2019; pp. 261–270. [Google Scholar] [CrossRef]
- Calzavara, S.; Conti, M.; Focardi, R.; Rabitti, A.; Tolomei, G. Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities. In Proceedings of the IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, 17–19 June 2019; pp. 528–543. [Google Scholar] [CrossRef]
- Wei, H.; Hassanshahi, B.; Bai, G.; Krishnan, P.; Vorobyov, K. MoScan: A model-based vulnerability scanner for web single sign-on services. In Proceedings of the ISSTA ’21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, Denmark, 11–17 July 2021; Cadar, C., Zhang, X., Eds.; ACM: New York, NY, USA, 2021; pp. 678–681. [Google Scholar] [CrossRef]
- Deng, G.; Zhang, Z.; Li, Y.; Liu, Y.; Zhang, T.; Liu, Y.; Yu, G.; Wang, D. NAUTILUS: Automated RESTful API Vulnerability Detection. In Proceedings of the 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, 9–11 August 2023; Calandrino, J.A., Troncoso, C., Eds.; USENIX Association: Berkeley, CA, USA, 2023. [Google Scholar]
- Alhuzali, A.; Gjomemo, R.; Eshete, B.; Venkatakrishnan, V.N. NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications. In Proceedings of the 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, 15–17 August 2018; Enck, W., Felt, A.P., Eds.; USENIX Association: Berkeley, CA, USA, 2018; pp. 377–392. [Google Scholar]
- Kurth, M.; Gras, B.; Andriesse, D.; Giuffrida, C.; Bos, H.; Razavi, K. NetCAT: Practical Cache Attacks from the Network. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 18–21 May 2020. [Google Scholar] [CrossRef]
- Melicher, W.; Ur, B.; Komanduri, S.; Bauer, L.; Christin, N.; Cranor, L.F. Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. In Proceedings of the 2017 USENIX Annual Technical Conference, USENIX ATC 2017, Santa Clara, CA, USA, 12–14 July 2017; Silva, D.D., Ford, B., Eds.; USENIX Association: Berkeley, CA, USA, 2017. [Google Scholar]
- Rankothge, W.H.; Randeniya, S.M.N. Identification and Mitigation Tool For Cross-Site Request Forgery (CSRF). In Proceedings of the 2020 IEEE 8th R10 Humanitarian Technology Conference (R10-HTC), Kuching, Malaysia, 1–3 December 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Leal, A.G.; Teixeira, I.C. Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language. In Proceedings of the 2018 International Symposium on Networks, Computers and Communications, ISNCC 2018, Rome, Italy, 19–21 June 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Chatterjee, R.; Bonneau, J.; Juels, A.; Ristenpart, T. Cracking-Resistant Password Vaults Using Natural Language Encoders. In Proceedings of the 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, 17–21 May 2015; IEEE Computer Society: Piscataway, NJ, USA, 2015; pp. 481–498. [Google Scholar] [CrossRef]
- Ntantogian, C.; Bountakas, P.; Antonaropoulos, D.; Patsakis, C.; Xenakis, C. NodeXP: NOde. js server-side JavaScript injection vulnerability DEtection and eXPloitation. J. Inf. Secur. Appl. 2021, 58, 102752. [Google Scholar] [CrossRef]
- Koutroumpouchos, N.; Lavdanis, G.; Veroni, E.; Ntantogian, C.; Xenakis, C. ObjectMap: Detecting insecure object deserialization. In Proceedings of the 23rd Pan-Hellenic Conference on Informatics, PCI 2019, Nicosia, Cyprus, 28–30 November 2019; Manolopoulos, Y., Papadopoulos, G.A., Stassopoulou, A., Dionysiou, I., Kyriakides, I., Tsapatsoulis, N., Eds.; ACM: New York, NY, USA, 2019; pp. 67–72. [Google Scholar] [CrossRef]
- Dürmuth, M.; Angelstorf, F.; Castelluccia, C.; Perito, D.; Chaabane, A. OMEN: Faster password guessing using an ordered Markov enumerator. In Proceedings of the Engineering Secure Software and Systems: 7th International Symposium, ESSoS 2015, Milan, Italy, 4–6 March 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 119–132. [Google Scholar] [CrossRef]
- Kasemsuwan, P.; Visoottiviseth, V. OSV: OSPF vulnerability checking tool. In Proceedings of the 2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE), Nakhon Si Thammarat, Thailand, 12–14 July 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Cao, H.; Huang, L.; Hu, S.; Shi, S.; Liu, Y. Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Guildford, UK, 29 May–1 June 2023; WiSec ’23. pp. 263–273. [Google Scholar] [CrossRef]
- Hitaj, B.; Gasti, P.; Ateniese, G.; Pérez-Cruz, F. PassGAN: A Deep Learning Approach for Password Guessing. In Proceedings of the Applied Cryptography and Network Security—17th International Conference, ACNS 2019, Bogota, Colombia, 5–7 June 2019; Proceedings. Deng, R.H., Gauthier-Umaña, V., Ochoa, M., Yung, M., Eds.; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2019; Volume 11464, pp. 217–237. [Google Scholar] [CrossRef]
- Rando, J.; Pérez-Cruz, F.; Hitaj, B. PassGPT: Password Modeling and (Guided) Generation with Large Language Models. In Proceedings of the Computer Security—ESORICS 2023—28th European Symposium on Research in Computer Security, The Hague, The Netherlands, 25–29 September 2023; Tsudik, G., Conti, M., Liang, K., Smaragdakis, G., Eds.; Proceedings, Part IV; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2023; Volume 14347, pp. 164–183. [Google Scholar] [CrossRef]
- Campi, A.M.D.; Focardi, R.; Luccio, F.L. The Revenge of Password Crackers: Automated Training of Password Cracking Tools. In Proceedings of the Computer Security—ESORICS 2022—27th European Symposium on Research in Computer Security, Copenhagen, Denmark, 26–30 September 2022; Atluri, V., Pietro, R.D., Jensen, C.D., Meng, W., Eds.; Proceedings, Part II; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2022; Volume 13555, pp. 317–336. [Google Scholar] [CrossRef]
- Luh, R.; Temper, M.; Tjoa, S.; Schrittwieser, S.; Janicke, H. PenQuest: A gamified attacker/defender meta model for cyber security assessment and education. J. Comput. Virol. Hacking Tech. 2020, 16, 19–61. [Google Scholar] [CrossRef]
- Deng, G.; Liu, Y.; Vilches, V.M.; Liu, P.; Li, Y.; Xu, Y.; Zhang, T.; Liu, Y.; Pinzger, M.; Rass, S. PentestGPT: An LLM-empowered Automatic Penetration Testing Tool. arXiv 2023, arXiv:2308.06782. [Google Scholar] [CrossRef]
- Nunes, P.J.C.; Fonseca, J.; Vieira, M. phpSAFE: A Security Analysis Tool for OOP Web Application Plugins. In Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, 22–25 June 2015; IEEE Computer Society: Piscataway, NJ, USA, 2015; pp. 299–306. [Google Scholar] [CrossRef]
- Jain, S.; Johari, R.; Kaur, A. PJCT: Penetration testing based JAVA code testing tool. In Proceedings of the International Conference on Computing, Communication & Automation; IEEE: Piscataway, NJ, USA, 2015; pp. 800–805. [Google Scholar] [CrossRef]
- Saccente, N.; Dehlinger, J.; Deng, L.; Chakraborty, S.; Xiong, Y. Project Achilles: A Prototype Tool for Static Method-Level Vulnerability Detection of Java Source Code Using a Recurrent Neural Network. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, ASE Workshops 2019, San Diego, CA, USA, 11–15 November 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 114–121. [Google Scholar] [CrossRef]
- Bozic, J.; Wotawa, F. PURITY: A Planning-based secURITY testing tool. In Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, Vancouver, BC, Canada, 3–5 August 2015; pp. 46–55. [Google Scholar] [CrossRef]
- Muralidharan, M.; Babu, K.B.; Sujatha, G. Pyciuti: A Python Based Customizable and Flexible Cybersecurity Utility Tool for Penetration Testing. In Proceedings of the 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA), Dehradun, India, 14–15 March 2023; pp. 679–683. [Google Scholar] [CrossRef]
- Amouei, M.; Rezvani, M.; Fateh, M. RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls. IEEE Trans. Dependable Secur. Comput. 2022, 19, 3371–3386. [Google Scholar] [CrossRef]
- Liu, Y.; Zhang, M.; Meng, W. Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities. In Proceedings of the 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24–27 May 2021; pp. 1468–1484. [Google Scholar] [CrossRef]
- Cloosters, T.; Paaßen, D.; Wang, J.; Draissi, O.; Jauernig, P.; Stapf, E.; Davi, L.; Sadeghi, A.R. RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64. In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, Limassol, Cyprus, 26–28 October 2022; pp. 30–42. [Google Scholar] [CrossRef]
- Girotto, G.; Zorzo, A.F. Robin: A Web Security Tool. arXiv 2020, arXiv:2007.06629. [Google Scholar] [CrossRef]
- Rivera, S.; Lagraa, S.; State, R. ROSploit: Cybersecurity Tool for ROS. In Proceedings of the 3rd IEEE International Conference on Robotic Computing, IRC 2019, Naples, Italy, 25–27 February 2019; pp. 415–416. [Google Scholar] [CrossRef]
- Fagroud, F.Z.; Toumi, H.; Baddi, Y.; El Filali, S. RT-RCT: An online tool for real-time retrieval of connected things. Bull. Electr. Eng. Inform. 2021, 10, 2804–2810. [Google Scholar] [CrossRef]
- Yin, Z.; Xu, Y.; Ma, F.; Gao, H.; Qiao, L.; Jiang, Y. Scanner++: Enhanced Vulnerability Detection of Web Applications with Attack Intent Synchronization. ACM Trans. Softw. Eng. Methodol. 2023, 32, 7. [Google Scholar] [CrossRef]
- Veras, R.; Collins, C.; Thorpe, J. On Semantic Patterns of Passwords and their Security Impact. In Proceedings of the 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, CA, USA, 23–26 February 2014. [Google Scholar] [CrossRef]
- Shcherbakov, M.; Balliu, M. SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web. In Proceedings of the 28th Annual Network and Distributed System Security Symposium, NDSS 2021, Virtually, 21–25 February 2021. [Google Scholar] [CrossRef]
- Genge, B.; Enachescu, C. ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services. Secur. Commun. Netw. 2016, 9, 2696–2714. [Google Scholar] [CrossRef]
- Mikulskis, J.; Becker, J.K.; Gvozdenovic, S.; Starobinski, D. Snout: An Extensible IoT Pen-Testing Tool. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, 11–15 November 2019; Cavallaro, L., Kinder, J., Wang, X., Katz, J., Eds.; ACM: New York, NY, USA, 2019; pp. 2529–2531. [Google Scholar] [CrossRef]
- Antunes, N.; Vieira, M. SOA-Scanner: An integrated tool to detect vulnerabilities in service-based infrastructures. In Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, 28 June–3 July 2013; pp. 280–287. [Google Scholar] [CrossRef]
- Sommer, R.; Amann, J.; Hall, S. Spicy: A unified deep packet inspection framework for safely dissecting all your data. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, 5–9 December 2016; Schwab, S., Robertson, W.K., Balzarotti, D., Eds.; ACM: New York, NY, USA, 2016; pp. 558–569. [Google Scholar] [CrossRef]
- Li, Z.; Yu, X.; Wang, D.; Liu, Y.; Yin, H.; He, S. SuperEye: A Distributed Port Scanning System. In Proceedings of the Artificial Intelligence and Security—5th International Conference, ICAIS 2019, New York, NY, USA, 26–28 July 2019; Sun, X., Pan, Z., Bertino, E., Eds.; Proceedings, Part IV. Springer: Berlin/Heidelberg, Germany, 2019; Volume 11635, pp. 46–56. [Google Scholar] [CrossRef]
- Holm, H.; Sommestad, T. SVED: Scanning, Vulnerabilities, Exploits and Detection. In Proceedings of the 2016 IEEE Military Communications Conference, MILCOM 2016, Baltimore, MD, USA, 1–3 November 2016; Brand, J., Valenti, M.C., Akinpelu, A., Doshi, B.T., Gorsic, B.L., Eds.; IEEE: Piscataway, NJ, USA, 2016; pp. 976–981. [Google Scholar] [CrossRef]
- Valenza, F.; Karafili, E.; Steiner, R.V.; Lupu, E.C. A Hybrid Threat Model for Smart Systems. IEEE Trans. Dependable Secur. Comput. 2023, 20, 4403–4417. [Google Scholar] [CrossRef]
- Luo, C.; Li, P.; Meng, W. TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, 7–11 November 2022; Yin, H., Stavrou, A., Cremers, C., Shi, E., Eds.; ACM: New York, NY, USA, 2022; pp. 2175–2188. [Google Scholar] [CrossRef]
- Olivo, O.; Dillig, I.; Lin, C. Detecting and exploiting second order denial-of-service vulnerabilities in web applications. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015; pp. 616–628. [Google Scholar] [CrossRef]
- Bitsikas, E.; Khandker, S.; Salous, A.; Ranganathan, A.; Piqueras Jover, R.; Pöpper, C. UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Guildford, UK, 29 May–1 June 2023; pp. 121–132. [Google Scholar] [CrossRef]
- Bertani, A.; Bonelli, M.; Binosi, L.; Carminati, M.; Zanero, S.; Polino, M. Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment—20th International Conference, DIMVA 2023, Hamburg, Germany, 12–14 July 2023; Proceedings. Gruss, D., Maggi, F., Fischer, M., Carminati, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2023; Volume 13959, pp. 256–275. [Google Scholar] [CrossRef]
- Vimala, K.; Fugkeaw, S. VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework. In Proceedings of the 2022 14th International Conference on Knowledge and Smart Technology (KST), Chon Buri, Thailand, 26–29 January 2022. [Google Scholar] [CrossRef]
- Blome, A.; Ochoa, M.; Li, K.; Peroli, M.; Dashti, M.T. Vera: A flexible model-based vulnerability testing tool. In Proceedings of the 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, Luxembourg, 18–22 March 2013; pp. 471–478. [Google Scholar] [CrossRef]
- Kim, S.; Woo, S.; Lee, H.; Oh, H. VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. In Proceedings of the 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, 22–26 May 2017; IEEE Computer Society: Piscataway, NJ, USA, 2017; pp. 595–614. [Google Scholar] [CrossRef]
- Kamongi, P.; Kotikela, S.; Kavi, K.; Gomathisankaran, M.; Singhal, A. Vulcan: Vulnerability assessment framework for cloud computing. In Proceedings of the 2013 IEEE 7th International Conference on Software Security and Reliability, Gaithersburg, MD, USA, 18–20 June 2013; pp. 218–226. [Google Scholar] [CrossRef]
- Wu, Y.; Zou, D.; Dou, S.; Yang, W.; Xu, D.; Jin, H. VulCNN: An Image-Inspired Scalable Vulnerability Detection System. In Proceedings of the 44th International Conference on Software Engineering, Pittsburgh, PA, USA, 25–27 May 2022; pp. 2365–2376. [Google Scholar] [CrossRef]
- Li, Z.; Zou, D.; Xu, S.; Ou, X.; Jin, H.; Wang, S.; Deng, Z.; Zhong, Y. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In Proceedings of the 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, CA, USA, 18–21 February 2018. [Google Scholar] [CrossRef]
- Cigoj, P.; Blazic, B.J. An Intelligent and Automated WCMS Vulnerability-Discovery Tool: The Current State of the Web. IEEE Access 2019, 7, 175466–175473. [Google Scholar] [CrossRef]
- Castiglione, A.; Palmieri, F.; Petraglia, M.; Pizzolante, R. Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities. In Proceedings of the Testing Software and Systems; Casola, V., De Benedictis, A., Rak, M., Eds.; Springer: Cham, Switzerland, 2020; pp. 89–103. [Google Scholar] [CrossRef]
- Li, Z.; Zou, D.; Xu, S.; Jin, H.; Qi, H.; Hu, J. VulPecker: An automated vulnerability detection system based on code similarity analysis. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, 5–9 December 2016; Schwab, S., Robertson, W.K., Balzarotti, D., Eds.; ACM: New York, NY, USA, 2016; pp. 201–213. [Google Scholar] [CrossRef]
- Ðurić, Z. WAPTT-Web application penetration testing tool. Adv. Electr. Comput. Eng. 2014, 14, 93–102. [Google Scholar] [CrossRef]
- van Rooij, O.; Charalambous, M.A.; Kaizer, D.; Papaevripides, M.; Athanasopoulos, E. webFuzz: Grey-Box Fuzzing for Web Applications. In Proceedings of the Computer Security—ESORICS 2021—26th European Symposium on Research in Computer Security, Darmstadt, Germany, 4–8 October 2021; Bertino, E., Schulmann, H., Waidner, M., Eds.; Proceedings, Part I. Springer: Berlin/Heidelberg, Germany, 2021; Volume 12972, pp. 152–172. [Google Scholar] [CrossRef]
- Rankothge, W.H.; Randeniya, M.; Samaranayaka, V. Identification and Mitigation Tool for Sql Injection Attacks (SQLIA). In Proceedings of the 15th IEEE International Conference on Industrial and Information Systems, ICIIS 2020, Rupnagar, India, 26–28 November 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 591–595. [Google Scholar] [CrossRef]
- Ding, J.; Atif, Y.; Andler, S.F.; Lindström, B.; Jeusfeld, M. CPS-based threat modeling for critical infrastructure protection. ACM Sigmetrics Perform. Eval. Rev. 2017, 45, 129–132. [Google Scholar] [CrossRef]
- Agadakos, I.; Chen, C.Y.; Campanelli, M.; Anantharaman, P.; Hasan, M.; Copos, B.; Lepoint, T.; Locasto, M.; Ciocarlie, G.F.; Lindqvist, U. Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things. In Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and Privacy, Dallas, TX, USA, 3 November 2017; pp. 37–48. [Google Scholar] [CrossRef]
- Castiglione, L.M.; Lupu, E.C. Hazard driven threat modelling for cyber physical systems. In Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, Virtual Event, 9 November 2020; pp. 13–24. [Google Scholar] [CrossRef]
- Evans, M.; He, Y.; Maglaras, L.; Janicke, H. HEART-IS: A novel technique for evaluating human error-related information security incidents. Comput. Secur. 2019, 80, 74–89. [Google Scholar] [CrossRef]
- David, N.; David, A.; Hansen, R.R.; Larsen, K.G.; Legay, A.; Olesen, M.C.; Probst, C.W. Modelling social-technical attacks with timed automata. In Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, Denver, CO, USA, 12–16 October 2015; pp. 21–28. [Google Scholar] [CrossRef]
- Malik, S.U.R.; Anjum, A.; Moqurrab, S.A.; Srivastava, G. Towards enhanced threat modelling and analysis using a Markov Decision Process. Comput. Commun. 2022, 194, 282–291. [Google Scholar] [CrossRef]
- Kalliamvakou, E.; Gousios, G.; Blincoe, K.; Singer, L.; German, D.M.; Damian, D. An in-depth study of the promises and perils of mining GitHub. Empir. Softw. Eng. 2016, 21, 2035–2071. [Google Scholar] [CrossRef]
- Metzger, A. Free and Open Source Software (FOSS) and Other Alternative License Models: A Comparative Analysis; Springer: Berlin/Heidelberg, Germany, 2015; Volume 12. [Google Scholar]
- Mirhosseini, S.; Parnin, C. Docable: Evaluating the executability of software tutorials. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Virtual Event, 8–13 November 2020; pp. 375–385. [Google Scholar] [CrossRef]
- Walshe, T.; Simpson, A. An empirical study of bug bounty programs. In Proceedings of the 2020 IEEE 2nd International Workshop on Intelligent Bug Fixing (IBF), London, ON, Canada, 18 February 2020; pp. 35–44. [Google Scholar] [CrossRef]
- Lynch, K.; Ivancheva, M. Academic freedom and the commercialisation of universities: A critical ethical analysis. Ethics Sci. Environ. Politics 2015, 15, 71–85. [Google Scholar] [CrossRef]
- University College and Union. Workload Survery 2021 Data Report. 2022. Available online: https://www.ucu.org.uk/media/12905/UCU-workload-survey-2021-data-report/pdf/WorkloadReportJune22.pdf (accessed on 10 April 2024).
- Alhamed, M.; Rahman, M.M.H. A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions. Appl. Sci. 2023, 13, 6986. [Google Scholar] [CrossRef]
- Sarker, K.U.; Yunus, F.; Deraman, A. Penetration Taxonomy: A Systematic Review on the Penetration Process, Framework, Standards, Tools, and Scoring Methods. Sustainability 2023, 15, 10471. [Google Scholar] [CrossRef]
- Shahid, J.; Hameed, M.K.; Javed, I.T.; Qureshi, K.N.; Ali, M.; Crespi, N. A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions. Appl. Sci. 2022, 12, 4077. [Google Scholar] [CrossRef]
- Alzahrani, A.; Alqazzaz, A.; Zhu, Y.; Fu, H.; Almashfi, N. Web application security tools analysis. In Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (Bigdatasecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), Beijing, China, 26–28 May 2017; pp. 237–242. [Google Scholar] [CrossRef]
- Ravindran, U.; Potukuchi, R.V. A Review on Web Application Vulnerability Assessment and Penetration Testing. Rev. Comput. Eng. Stud. 2022, 9. [Google Scholar] [CrossRef]
- Kowta, A.S.L.; Bhowmick, K.; Kaur, J.R.; Jeyanthi, N. Analysis and overview of information gathering & tools for pentesting. In Proceedings of the 2021 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 27–29 January 2021; pp. 1–13. [Google Scholar] [CrossRef]
- Zilberman, P.; Puzis, R.; Bruskin, S.; Shwarz, S.; Elovici, Y. Sok: A survey of open-source threat emulators. arXiv 2020, arXiv:2003.01518. [Google Scholar]
- Durumeric, Z.; Wustrow, E.; Halderman, J.A. {ZMap}: Fast internet-wide scanning and its security applications. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security 13), Washington, DC, USA, 14–16 August 2013; pp. 605–620. [Google Scholar]
- Lattner, C.; Adve, V.S. LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In Proceedings of the 2nd IEEE/ACM International Symposium on Code Generation and Optimization (CGO 2004), San Jose, CA, USA, 20–24 March 2004; IEEE Computer Society: Piscataway, NJ, USA, 2004; pp. 75–88. [Google Scholar] [CrossRef]
- Juliet Test Suites.NSA Center for Assured Software. Available online: https://samate.nist.gov/SARD/test-suites/112 (accessed on 10 April 2024).
- Bojinov, H.; Bursztein, E.; Boyen, X.; Boneh, D. Kamouflage: Loss-resistant password management. In Proceedings of the Computer Security–ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, 20–22 September 2010; Proceedings 15. Springer: Berlin/Heidelberg, Germany, 2010; pp. 286–302. [Google Scholar] [CrossRef]
- Narayanan, A.; Shmatikov, V. Fast dictionary attacks on passwords using time-space tradeoff. In Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 16–18 October 2005; pp. 364–372. [Google Scholar] [CrossRef]
- Weir, M.; Aggarwal, S.; De Medeiros, B.; Glodek, B. Password cracking using probabilistic context-free grammars. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, Oakland, CA, USA, 17–20 May 2009; pp. 391–405. [Google Scholar] [CrossRef]
- Pale, P.C. Mastering the Nmap Scripting Engine; Packt Publishing Ltd.: Birmingham, UK, 2015. [Google Scholar]
Tool Name | Year | License Type | Source Code Repository |
---|---|---|---|
ADaMs [46] | 2021 | MIT License | https://github.com/TheAdamProject/adams |
AIBugHunter [47] | 2023 | MIT License | https://github.com/awsm-research/aibughunter |
ARMONY [48] | 2013 | Not Available | Not Available |
Autosploit [49] | 2020 | Not Available | Not Available |
AVAIN [50] | 2019 | MIT License | https://github.com/ra1nb0rN/Avain |
Bbuzz [51] | 2017 | MIT License | https://github.com/lockout/Bbuzz |
Black Ostrich [52] | 2023 | Not Available | Not Available |
Black Widow [53] | 2021 | Not Specified | https://github.com/SecuringWeb/BlackWidow |
Bleem [54] | 2023 | Not Available | Not Available |
Cairis [55] | 2020 | Apache 2.0 | https://github.com/cairis-platform/cairis |
Censys [56] | 2015 | Apache 2.0 + ISC | https://github.com/zmap/zgrab2 |
Chainsaw [57] | 2016 | Not Available | Not Available |
Chucky [58] | 2013 | GPLv3 | https://github.com/a0x77n/chucky-ng/ |
Commix [59] | 2019 | GPLv3 | https://github.com/commixproject/commix |
CryptoGuard [60] | 2019 | GPLv3 | https://github.com/CryptoGuardOSS/cryptoguard |
CuPerFuzzer [61] | 2021 | Not Specified | https://github.com/little-leiry/CuPerFuzzer |
Deemon [62] | 2017 | GPLv3 | https://github.com/tgianko/deemon |
Delta [63] | 2017 | Not Specified | https://github.com/seungsoo-lee/DELTA |
DFBC [64] | 2021 | Not Available | Not Available |
Diane [65] | 2021 | Not Specified | https://github.com/ucsb-seclab/diane |
EBF [66] | 2021 | MIT License | https://github.com/fatimahkj/EBF |
ELAID [67] | 2020 | Not Available | Not Available |
ESASCF [68] | 2023 | Available upon request | Available upon request |
ESRFuzzer [69] | 2021 | Not Available | Not Available |
ESSecA [70] | 2022 | Not Specified | https://github.com/DanieleGranata94/SlaGenerator |
Firmaster [71] | 2018 | Not Available | Not Available |
FUGIO [72] | 2022 | Not Specified | https://github.com/WSP-LAB/FUGIO |
FUSE [73] | 2020 | Not Specified | https://github.com/WSP-LAB/FUSE |
Gail-PT [74] | 2023 | Not Specified | https://github.com/Shulong98/GAIL-PT/ |
GNPassGAN [75] | 2022 | MIT License | https://github.com/fangyiyu/GNPassGAN/ |
HARMer [76] | 2020 | MIT License | https://github.com/whistlebee/harmat |
HILTI [77] | 2014 | Not Specified | https://github.com/rsmmr/hilti |
IoTFuzzer [78] | 2018 | Not Specified | https://github.com/zyw-200/IOTFuzzer_Full |
JCOMIX [79] | 2019 | Not Specified | https://github.com/SERG-Delft/JCOMIX |
LAID [80] | 2018 | Not Available | Not Available |
Link [81] | 2022 | Not Specified | https://github.com/WSP-LAB/Link |
Lore [82] | 2023 | Not Available | Not Available |
LTESniffer [83] | 2023 | Not Specified | https://github.com/SysSec-KAIST/LTESniffer |
Mace [84] | 2014 | Not Available | Not Available |
MAIT [85] | 2021 | Not Available | Not Available |
MAL [86] | 2018 | Apache 2.0 | https://github.com/mal-lang/malcompiler/ |
MaliceScript [87] | 2018 | Not Available | Not Available |
Masat [88] | 2015 | Not Available | Not Available |
Mirage [89] | 2019 | MIT License | https://github.com/RCayre/mirage |
Mitch [90] | 2019 | Not Specified | https://github.com/alviser/mitch |
MoScan [91] | 2021 | UPL 1.0 | https://github.com/baigd/moscan |
NAUTILUS [92] | 2023 | Apache 2.0 | https://github.com/chenleji/nautilus |
NAVEX [93] | 2018 | GPLv3 | https://github.com/aalhuz/navex |
NetCAT [94] | 2020 | Not Available | Not Available |
NeuralNetworkCracking [95] | 2016 | Apache 2.0 | https://github.com/cupslab/neural_network_cracking |
No Name (CSRF) [96] | 2020 | Not Available | Not Available |
No Name (TTCN-3) [97] | 2018 | Not Available | Not Available |
NoCrack [98] | 2015 | MIT License | https://github.com/rchatterjee/nocrack |
NodeXP [99] | 2021 | Not Specified | https://github.com/esmog/nodexp |
ObjectMap [100] | 2019 | MIT License | https://github.com/georlav/objectmap |
OMEN [101] | 2015 | MIT License | https://github.com/RUB-SysSec/OMEN |
OSV [102] | 2017 | GPLv3 | https://github.com/Emoform/OSV |
Owfuzz [103] | 2023 | GPLv3 | https://github.com/alipay/Owfuzz |
PassGAN [104] | 2019 | MIT License | https://github.com/brannondorsey/PassGAN |
PassGPT [105] | 2023 | CC BY-NC 4.0 | https://github.com/javirandor/passgpt |
PasswordCrackingTraining [106] | 2022 | MIT License | https://github.com/focardi/PasswordCrackingTraining |
PenQuest [107] | 2020 | Proprietary | https://www.pen.quest/ |
PentestGPT [108] | 2023 | MIT License | https://github.com/GreyDGL/PentestGPT |
PhpSAFE [109] | 2015 | GPLv2 | https://github.com/JoseCarlosFonseca/phpSAFE |
PJCT [110] | 2015 | Not Available | Not Available |
Project Achilles [111] | 2019 | LGPLv3 | https://github.com/secure-software-engineering/achilles-benchmark-depscanners |
PURITY [112] | 2015 | Proprietary | Not Available |
Pyciuti [113] | 2023 | Not Available | Not Available |
RAT [114] | 2022 | Available upon request | Available upon request |
Revealer [115] | 2021 | GPLv2 | https://github.com/cuhk-seclab/Revealer |
RiscyROP [116] | 2022 | Not Available | Not Available |
Robin [117] | 2020 | Not Specified | https://github.com/olmps/Robin |
ROSploit [118] | 2019 | MIT License | https://github.com/seanrivera/rosploit |
RT-RCT [119] | 2021 | Not Available | Not Available |
Scanner++ [120] | 2023 | Not Available | Not Available |
SemanticGuesser [121] | 2014 | Not Specified | https://github.com/vialab/semantic-guesser |
SerialDetector [122] | 2021 | Not Specified | https://github.com/yuske/SerialDetector |
ShoVAT [123] | 2016 | Not Available | Not Available |
Snout [124] | 2019 | Not Specified | https://github.com/nislab/snout/ |
SOA-Scanner [125] | 2013 | Not Available | Not Available |
Spicy [126] | 2016 | MIT License | https://github.com/zeek/spicy/ |
SuperEye [127] | 2019 | Not Available | Not Available |
SVED [128] | 2016 | Not Available | Not Available |
TAMELESS [129] | 2023 | Not Specified | https://github.com/FulvioValenza/TAMELESS |
TChecker [130] | 2022 | Not Available | Not Available |
TORPEDO [131] | 2015 | Not Available | Not Available |
UE Security Reloaded [132] | 2023 | Not Available | Not Available |
Untangle [133] | 2023 | Not Specified | https://github.com/untangle-tool/untangle |
VAPE-BRIDGE [134] | 2022 | Not Available | Not Available |
VERA [135] | 2013 | Not Available | Not Available |
VUDDY [136] | 2017 | MIT License | https://github.com/squizz617/vuddy |
Vulcan [137] | 2013 | Not Available | Not Available |
VulCNN [138] | 2022 | Not Specified | https://github.com/CGCL-codes/VulCNN |
VulDeePecker [139] | 2018 | Apache 2.0 | https://github.com/CGCL-codes/VulDeePecker |
Vulnet [140] | 2019 | Not Available | Not Available |
Vulnsloit [141] | 2020 | Available upon request | Available upon request |
VulPecker [142] | 2016 | Not Specified | https://github.com/vulpecker/Vulpecker |
WAPTT [143] | 2014 | Not Available | Not Available |
WebFuzz [144] | 2021 | GPLv3 | https://github.com/ovanr/webFuzz |
WebVIM [145] | 2020 | Not Available | Not Available |
(a) Number of tools identified according to PTES phases | |
PTES Phase | No. |
Vulnerability Analysis | 80 |
Exploitation | 39 |
Post-Exploitation | 21 |
Intelligence Gathering | 20 |
Threat Modelling | 6 |
Reporting | 4 |
Pre-engagement Interactions | 0 |
(b) Number of tools identified according to Mitre ATTA&CK phases | |
Mitre ATTA&CK Phase | No. |
Reconnaissance | 84 |
Initial Access | 48 |
Resource Development | 21 |
Discovery | 11 |
Execution | 9 |
Credential Access | 9 |
Collection | 2 |
Impact | 1 |
Persistence | 0 |
Privilege Escalation | 0 |
Defense Evasion | 0 |
Lateral Movement | 0 |
Command and Control | 0 |
Exfiltration | 0 |
CyBOK Knowledge Area | No. |
---|---|
Software and Platform Security: Software Security | 77 |
Software and Platform Security: Web and Mobile Security | 38 |
Infrastructure Security: Network Security | 26 |
Attacks and Defences: Adversarial Behaviours | 9 |
Systems Security: Authentication, Authorisation and Accountability | 9 |
Systems Security: Distributed Systems Security | 3 |
Infrastructure Security: Applied Cryptography | 2 |
Human, Organisational and Regulatory Aspects: Human Factors | 2 |
Attacks and Defences: Malware and Attack Technology | 1 |
Infrastructure Security: Physical Layer and Telecommunications Security | 1 |
Human, Organisational and Regulatory Aspects: Privacy and Online Rights | 1 |
(a) Peer Reviewed | ||
Peer Reviewed | No. | % |
Y | 96 | 96.00% |
N | 4 | 4.00% |
Total | 100 | 100.00% |
(b) Source Code Available | ||
Source Code Avail. | No. | % |
Y | 59 | 59.00% |
N | 41 | 41.00% |
Total | 100 | 100.00% |
(a) Distribution of Period of Project Activity (last—first commit) | ||
Period (Months) | No. | % |
0–3 | 19 | 32.20% |
4–6 | 3 | 5.08% |
6–12 | 6 | 10.17% |
13–24 | 6 | 10.17% |
25–36 | 10 | 16.95% |
37–60 | 8 | 13.56% |
61-inf | 7 | 11.86% |
Total | 59 | 100.00% |
(b) Distribution of Number of Project’s Commits | ||
Commits Range | No. | % |
1–10 | 17 | 28.81% |
11–50 | 19 | 32.20% |
51–100 | 4 | 6.78% |
101–250 | 6 | 10.17% |
251–500 | 5 | 8.47% |
501-inf | 8 | 13.56% |
Total | 59 | 100.00% |
% of Project Activity | No | % |
---|---|---|
0–0 | 5 | 8.47% |
1–25 | 12 | 20.34% |
26–50 | 15 | 25.42% |
51–75 | 5 | 8.47% |
76–99 | 2 | 3.39% |
100–100 | 20 | 33.90% |
Total | 59 | 100.00% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Modesti, P.; Golightly, L.; Holmes, L.; Opara, C.; Moscini, M. Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools. J. Cybersecur. Priv. 2024, 4, 410-448. https://doi.org/10.3390/jcp4030021
Modesti P, Golightly L, Holmes L, Opara C, Moscini M. Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools. Journal of Cybersecurity and Privacy. 2024; 4(3):410-448. https://doi.org/10.3390/jcp4030021
Chicago/Turabian StyleModesti, Paolo, Lewis Golightly, Louis Holmes, Chidimma Opara, and Marco Moscini. 2024. "Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools" Journal of Cybersecurity and Privacy 4, no. 3: 410-448. https://doi.org/10.3390/jcp4030021
APA StyleModesti, P., Golightly, L., Holmes, L., Opara, C., & Moscini, M. (2024). Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools. Journal of Cybersecurity and Privacy, 4(3), 410-448. https://doi.org/10.3390/jcp4030021