Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32827
Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists

Authors: K. Hołda, D. Śliwa, K. Daniec

Abstract:

This article was created as part of the developed master's thesis. It attempts to present a developed device, which will support the work of specialists dealing with broadly understood cybersecurity terms. The device is contrived to automate security tests. In addition, it simulates potential cyberattacks in the most realistic way possible, without causing permanent damage to the network, in order to maximize the quality of the subsequent corrections to the tested network systems. The proposed solution is a fully operational prototype created from commonly available electronic components and a single board computer. The focus of the article is not only put on the hardware part of the device but also on the theoretical and applicatory way in which implemented cybersecurity tests operate and examples of their results.

Keywords: Raspberry Pi, ethernet, automated cybersecurity tests, ARP, DNS, backdoor, TCP, password sniffing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 709

References:


[1] Gohdes, A. R. (2020). Repression technology: Internet accessibility and state violence. American Journal of Political Science, 64(3), 488-503.
[2] Abhishek Mukherjee, Bill Rojas, Hugh Ujhazy, "Business Models for the Long-Term Storage of Internet of Things Use Case Data", Market Perspective - Doc # AP45984120, 07.2020
[3] E. D. Martin, J. Kargaard and I. Sutherland, "Raspberry Pi Malware: An Analysis of Cyberattacks Towards IoT Devices," 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2019, pp. 161-166, doi: 10.1109/DESSERT.2019.8770027.
[4] R. Doshi, N. Apthorpe and N. Feamster, "Machine Learning DDoS Detection for Consumer Internet of Things Devices," 2018 IEEE Security and Privacy Workshops (SPW), 2018, pp. 29-35, doi: 10.1109/SPW.2018.00013.
[5] O. Westerlund and R. Asif, "Drone Hacking with Raspberry-Pi 3 and WiFi Pineapple: Security and Privacy Threats for the Internet-of-Things," 2019 1st International Conference on Unmanned Vehicle Systems-Oman (UVS), 2019, pp. 1-10, doi: 10.1109/UVS.2019.8658279.
[6] M. Yevdokymenko, E. Mohamed and P. Onwuakpa, "Ethical hacking and penetration testing using raspberry PI," 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), 2017, pp. 179-181, doi: 10.1109/INFOCOMMST.2017.8246375.
[7] HUDAIB, Adam Ali Zare; HUDAIB, E. A. Z. DNS advanced attacks and analysis. International Journal of Computer Science and Security (IJCSS), 2014, 8.2: 63.
[8] Hsiao, H. W., Lin, C. S., & Chang, S. Y. (2009, August). Constructing an ARP attack detection system with SNMP traffic data mining. In Proceedings of the 11th international conference on electronic commerce (pp. 341-345).
[9] "hotplug attack tools" (Online) Available on: https://shop.hak5.org/collections/hotplug-attack-tools
[10] "MouseJack device discovery and research tools" (Online) Available on: https://github.com/BastilleResearch/mousejack
[11] "P4wnP1 ALOA payloads" (Online) Available on: https://github.com/akhil1136/P4wnP1-ALOA-payloads
[12] Fábio Mestre, "P4wnP1 A.L.O.A.— An advanced HID attack device" (Online) Available on: https://medium.com/azkrath/p4wnp1-a-l-o-a-an-advanced-hid-attack-device-d906ae5bf48c
[13] "LAN TURTLE BASICS" (Online) Available on: https://docs.hak5.org/hc/en-us/articles/360010554853-LAN-Turtle-Basics
[14] Redondo, J. M., & Ortin, F. (2014). A comprehensive evaluation of common python implementations. IEEE Software, 32(4), 76-84.
[15] Nachreiner, C. (2003). Anatomy of an ARP poisoning attack. Retrieved July, 4, 2005.
[16] Brahara, B., Syamsuar, D., & Kunang, Y. N. (2020). Analysis of malware DNS attack on the network using domain name system indicators. Journal of Information Systems and Informatics, 2(1), 131-153.
[17] Atwell, C., Blasi, T., & Hayajneh, T. (2016, April). Reverse TCP and social engineering attacks in the era of big data. In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) (pp. 90-95). IEEE.
[18] "Reverse TCP shell with Metasploit" (Online) Available on: https://hacksland.net/reverse-tcp-shell-with-metasploit/
[19] "Meterpreter" (Online) Available on: https://doubleoctopus.com/security-wiki/threats-and-tools/meterpreter/
[20] Harrington, W. (2015). Learning raspbian. Packt Publishing Ltd.
[21] „MAX17040-MAX17041 1-Cell-2-Cell Fuel Gauge with ModelGauge” (Online) Available on: https://datasheets.maximintegrated.com/en/ds/MAX17040-MAX17041.pdf
[22] „Mechanical Drawings” (Online) Available on: https://datasheets.raspberrypi.com/rpizero/raspberry-pi-zero-w-mechanical-drawing.pdf
[23] „Stand-Alone Ethernet Controller with SPI Interface” (Online) Available on: http://ww1.microchip.com/downloads/en/devicedoc/39662c.pdf
[24] "Virtual Private Server (VPS) or Virtual Dedicated Server (VDS)" (Online) Available on: searchservervirtualization.techtarget.com
[25] Kurth, M., Gras, B., Andriesse, D., Giuffrida, C., Bos, H., & Razavi, K. (2020, May). NetCAT: Practical cache attacks from the network. In 2020 IEEE Symposium on Security and Privacy (SP) (pp. 20-38). IEEE.
[26] Mojica Serrano, A. (2019). Hacking Mobile Devices Using WiFi Pineapple Nano. Computer Science Program.
[27] Lanze, F., Panchenko, A., Ponce-Alcaide, I., & Engel, T. (2014, September). Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11. In Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks (pp. 87-94).
[28] Fainelli, F. (2008, January). The OpenWrt embedded development framework. In Proceedings of the Free and Open Source Software Developers European Meeting (p. 106). sn.
[29] Kennedy, D., O'gorman, J., Kearns, D., & Aharoni, M. (2011). Metasploit: the penetration tester's guide. No Starch Press.
[30] Roy, D., Moazzami, K., & Singh, R. (2007). ARP Spoofing and Man in the Middle attack using Ettercap. School of Computer Science, University of Windsor, Canada.
[31] ” etterlog - Log analyzer for ettercap log files” (Online) Available on: http://manpages.ubuntu.com/manpages/impish/en/man8/etterlog.8.html
[32] Kelley, S. (2014). Dnsmasq-network services for small networks. Accessed 2016-04-27. URL: http://www. thekelleys. org. uk/dnsmasq/doc. html.
[33] „Setup the Ethernet gadget of PI Zero with dnsmasq” (Online) Available on: https://maxammann.org/posts/2019/03/setup-g_ether-dhcp/
[34] „134 Cybersecurity Statistics and Trends for 2021” (Online) Available on: https://www.varonis.com/blog/cybersecurity-statistics/
[35] „Cloud computing - statistics on the use by enterprises” (Online) Available on: https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Cloud_computing_-_statistics_on_the_use_by_enterprises