Information Gathering is a fundamental stage in a typical Penetration Testing (PT) process, in which penetration testers collect as much information as possible regarding a target system to uncover vulnerabilities, threats, and security issues. Metadata extraction plays an important role in this stage since it can reveal significant details about the target system, such as used technologies, software versions, user information, and network data, which can expose potential attack vectors. This paper introduces a novel framework for automated metadata extraction from documents linked within a specified web page. The framework is designed to streamline Information Gathering processes by offering an easy-to-use, integrated, extensible, and flexible solution. Our proposal can be effective in uncovering information that is not immediately visible to a penetration tester, giving them a greater chance of success in identifying the most fruitful attack patterns.

Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents

Pizzolante, Raffaele;Castiglione, Arcangelo;Palmieri, Francesco
2024

Abstract

Information Gathering is a fundamental stage in a typical Penetration Testing (PT) process, in which penetration testers collect as much information as possible regarding a target system to uncover vulnerabilities, threats, and security issues. Metadata extraction plays an important role in this stage since it can reveal significant details about the target system, such as used technologies, software versions, user information, and network data, which can expose potential attack vectors. This paper introduces a novel framework for automated metadata extraction from documents linked within a specified web page. The framework is designed to streamline Information Gathering processes by offering an easy-to-use, integrated, extensible, and flexible solution. Our proposal can be effective in uncovering information that is not immediately visible to a penetration tester, giving them a greater chance of success in identifying the most fruitful attack patterns.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4919665
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? 0
social impact