• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Deep Exploit: Fully automatic penetration test tool using Machine Learning

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,605
Solutions
2
Reputation
32
Reaction score
100,451
Points
2,313
Credits
32,570
‎6 Years of Service‎
 
76%
system_component.png


Deep Exploit

Fully automatic penetration test tool using Machine Learning.

Deep Exploit is fully automated penetration tool linked with Metasploit.
Deep Exploit has two exploitation modes.

    Intelligence mode
    Deep Exploit identifies the status of all opened ports on the target server and executes the exploit at pinpoint based on past experience (trained result).
    Brute force mode
    Deep Exploit executes exploits using all combinations of “exploit module”, “target” and “payload” corresponding to a user’s indicated product name and port number.

overview_deepexploit.png


Deep Exploit’s key features are following.

    Efficiently execute exploit.
    If “intelligence mode”, Deep Exploit can execute exploits at pinpoint (minimum 1 attempt).
    If “Brute force mode”, Deep Exploit can execute exploits thoroughly corresponding to user’s indicated product name and port number.
    Deep penetration.
    If Deep Exploit succeeds the exploit to the target server, it further executes the exploit to other internal servers.
    Operation is very easy.
    Your only operation is to input one command.
    It is very easy!!
    Self-learning.
    Deep Exploit doesn’t need the “learning data”.
    Deep Exploit can learn how to method of exploitation by itself (uses reinforcement learning).
    Learning time is very fast.
    Deep Exploit uses distributed learning by multi-agents.
    So, we adopted an advanced machine learning model called A3C.

Current Deep Exploit’s version is a beta.
But, it can automatically execute following actions:

    Intelligence gathering.
    Threat Modeling.
    Vulnerability analysis.
    Exploitation.
    Post-Exploitation.
    Reporting.

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top