z-logo
open-access-imgOpen Access
Board 26: Automatic Creation of Fine-Grained Vulnerable Windows System for Penetration Testing Education
Author(s) -
Arati Banerjee,
Damla Turgut,
Cliff C. Zou
Publication year - 2020
Publication title -
papers on engineering education repository (american society for engineering education)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.18260/1-2--32308
Subject(s) - computer security , computer science , penetration (warfare) , vulnerability (computing) , secure coding , virtual machine , software security assurance , operating system , information security , security service , engineering , operations research
In the face of the increasing needs of cybersecurity professionals from US public and private sectors, many universities have created various cybersecurity education programs. Penetration testing, as a critical component in cybersecurity training, often requires setting up virtual machines (VM) with various vulnerabilities. However, it is usually time-consuming and technically difficult to fine tune vulnerabilities in VM systems. In this paper, we present an automatic security patch removal tool that can fine tune various Windows VM systems to precise levels of vulnerabilities, and easily employed by students and educators alike. This tool can create virtual machines that simulate different security states in the Windows operating system timeline and gives a more realistic view of the ever-changing state of cybersecurity to the students pursuing an education in the field.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom