摘要(英) |
This study presents an automated discovery platform for web server
URLs, subdomains, and paths based on black box techniques, aiming to
improve website management and network security. Traditionally,
discovering subdomains and paths is manual, time-consuming, and errorprone. To address this, we propose the "RuneAlpha" system, which uses
advanced black-box techniques, automated tools, and fuzz testing to
efficiently identify all subdomains and paths of a website without needing
internal site knowledge.
The RuneAlpha system includes a management platform and the
Rune scanning module, capable of automatically exploring websites to
discover subdomains and potential paths. Testing on six types of websites
showed that RuneAlpha significantly outperforms manual methods in
effectiveness, accuracy, and completeness. The Rune scanning module
combines fuzz testing and crawling techniques with other web application
scanning tools to identify potential vulnerabilities. This technology offers
new tools and methods for better website management and network
security, helping organizations protect and manage their web resources
more effectively.
This study demonstrates the potential of black-box technology in
network security and provides valuable references for future research and
practice. |
參考文獻 |
[1] acunetix, “Web Application Security – Enterprises Are Losing the War,” 2020. [線上]. Available: https://www.acunetix.com/white-papers/web-application-security-enterprises-are-losing-the-war/.
[2] Intevation,DN-Systems, “openvas,” [線上]. Available: https://greenbone.github.io/docs/latest/background.html.
[3] J. Matherly, “shodan.io,” 2009. [線上]. Available: www.shodan.io.
[4] Z. D. a. D. A. a. A. Mirian, A Search Engine Backed by Internet-Wide Scanning, 22nd ACM Conference on Computer and , 2015.
[5] G. “. Lyon, “Nmap: Network Mapper,” 1997. [線上]. Available: https://nmap.org.
[6] invicti, “Spring 2021 Edition: Acunetix Web Vulnerability Report,” 2021. [線上]. Available: https://www.acunetix.com/white-papers/acunetix-web-application-vulnerability-report-2021/.
[7] Internetwache.org, “Don′t publicly expose .git or how we downloaded your website′s sourcecode - An analysis of Alexa′s 1M,” Internetwache.org , 28 7 2015. [線上]. Available: https://en.internetwache.org/dont-publicly-expose-git-or-how-we-downloaded-your-websites-sourcecode-an-analysis-of-alexas-1m-28-07-2015/.
[8] arthaud, “arthaud/git-dumper,” 2018. [線上]. Available: https://github.com/arthaud/git-dumper.
[9] A. S. Foundation, “CVE-2017-5638,” NIST, 10 3 2017. [線上]. Available: https://nvd.nist.gov/vuln/detail/cve-2017-5638.
[10] I. Red Hat, “CVE-2017-7529,” nist.gov, 13 7 2017. [線上]. Available: https://nvd.nist.gov/vuln/detail/CVE-2017-7529.
[11] B. S. a. V. S. a. U. V. a. S. Y. P, Identification of URL Fuzzing and Subdomain Enumeration Using Raccoon Tool, 2021 5th International Conference on Trends in Electronics and Informatics (ICOEI), 2021, pp. 1620-1625.
[12] S. S. a. K. Shah, “Expedite the Process of Reconnaissance: Eagle’s Eye of Security,” 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS), pp. 1-5, 2022.
[13] aboul3la, “aboul3la/Sublist3r,” [線上]. Available: https://github.com/aboul3la/Sublist3r.
[14] evyatarmeged, “evyatarmeged/Raccoon,” [線上]. Available: https://github.com/evyatarmeged/Raccoon. |