- Mastering Machine Learning for Penetration Testing
- Chiheb Chebbi
- 147字
- 2021-06-25 21:03:07
Deep Exploit
Many great publicly available tools appeared lately that use machine learning capabilities to leverage penetration testing to another level. One of these tools is Deep Exploit. It was presented at black hat conference 2018. It is a fully automated penetration test tool linked with metasploit. This great tool uses uses reinforcement learning (self-learning).

It is able to perform the following tasks:
- Intelligence gathering
- Threat modeling
- Vulnerability analysis
- Exploitation
- Post-exploitation
- Reporting
To download Deep Exploit visit its official GitHub repository: https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit.
It is consists of a machine learning model (A3C) and metasploit. This is a high level overview of Deep Exploit architecture:

The required environment to make Deep Exploit works properly is the following:
- Kali Linux 2017.3 (guest OS on VMWare)
- Memory: 8.0GB
- Metasploit framework 4.16.15-dev
- Windows 10 Home 64-bit (Host OS)
- CPU: Intel(R) Core(TM) i7-6500U 2.50GHz
- Memory: 16.0GB
- Python 3.6.1 (Anaconda3)
- TensorFlow 1.4.0
- Keras 2.1.2
推薦閱讀
- 通信網(wǎng)絡基礎與設備
- 網(wǎng)絡云百問百答
- Twilio Cookbook
- 網(wǎng)絡故障現(xiàn)場處理實踐(第4版)
- Oracle SOA Suite 11g Performance Tuning Cookbook
- Hands-On Full Stack Development with Spring Boot 2 and React(Second Edition)
- 網(wǎng)管員必讀:網(wǎng)絡管理(第2版)
- Bonita Open Solution 5.x Essentials
- 新手易學:新手學淘寶開店
- 網(wǎng)管工具使用與技巧大全
- 網(wǎng)絡設計與應用(第2版)
- 轉(zhuǎn)化:提升網(wǎng)站流量和轉(zhuǎn)化率的技巧
- AWS Lambda Quick Start Guide
- 現(xiàn)代通信系統(tǒng)(第5版)
- Building RESTful Web Services with .NET Core