官术网_书友最值得收藏!

Deep Exploit

Many great publicly available tools appeared lately that use machine learning capabilities to leverage penetration testing to another level. One of these tools is Deep Exploit. It was presented at black hat conference 2018. It is a fully automated penetration test tool linked with metasploit. This great tool uses uses reinforcement learning (self-learning).

It is able to perform the following tasks:

  • Intelligence gathering
  • Threat modeling
  • Vulnerability analysis
  • Exploitation
  • Post-exploitation
  • Reporting

To download Deep Exploit visit its official GitHub repository: https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit.

It is consists of a machine learning model (A3C) and metasploit. This is a high level overview of Deep Exploit architecture:

The required environment to make Deep Exploit works properly is the following:

  • Kali Linux 2017.3 (guest OS on VMWare)
    • Memory: 8.0GB
    • Metasploit framework 4.16.15-dev
  • Windows 10 Home 64-bit (Host OS)
    • CPU: Intel(R) Core(TM) i7-6500U 2.50GHz
    • Memory: 16.0GB
    • Python 3.6.1 (Anaconda3)
    • TensorFlow 1.4.0
    • Keras 2.1.2
主站蜘蛛池模板: 获嘉县| 册亨县| 德阳市| 灌阳县| 仪征市| 江华| 华蓥市| 神池县| 黑水县| 利川市| 青海省| 铁岭县| 钟山县| 四子王旗| 神农架林区| 荃湾区| 启东市| 井冈山市| 景洪市| 马公市| 淳安县| 东阳市| 金门县| 定日县| 兴海县| 简阳市| 蕲春县| 武冈市| 茂名市| 醴陵市| 临颍县| 中牟县| 海门市| 怀柔区| 玉门市| 库车县| 繁峙县| 白水县| 剑阁县| 台安县| 泽普县|