1. National Computer Network Intrusion Protection Center, Graduate University, Chinese Academy of Sciences, Beijing 100049, China;
2. Xi Dian University, Xi’an 710065, China
[1] Offensive Security. BackTrack Linux . http://www.backtrack-linux.org/.
[2] Fyodor. The art of port scanning . Phrack Magazine, 1997, 7(51): Article 11 .http: //nmap.org/nmap_doc.html.
[3] Deraison R. The nessus attack scripting language reference guide .(2000) http://www.virtualblueness.net/nasl.html.
[4] McNab C. Network security assessment [M]. O’Reilly Media, 2007.
[5] Kwon O H, Lee S M, Lee H, et al. HackSim: An automation of penetration testing for remote buffer overflow vulnerabilities //Information Networking - Convergence in Broadband and Mobile Networking-International Conference. 2005.
[6] Lee J. Exploit Automation with the Metasploit Framework . BlackHat-DC-2010-Egypt, 2010.
[7] Blyth A. An XML-based architecture to perform data integration and data unification in vulnerability assessments [J]. Information Security Technical Report, 2003, 8(4):14-25.
[8] Open Information Systems Security Group. ISSAF . . http://www.oissg.org/downloads/issaf/.
[9] Pete Herzog. Open Source security testing methodology manual . . http://www.isecom.org/osstmm/.
[10] InSecure. Nmap data standard . . http://www.insecure.org/nmap/data/nmap.dtd.
[11] Juanma M P. Nessus XMLRPC implementation in Ruby . http://nessus-xmlrpc.rubyforge.org/.