Air-Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units

Author:

Mohamed Nachaat1ORCID,Almazrouei Saif Khameis2,Oubelaid Adel3ORCID,Elsisi Mahmoud45ORCID,ElHalawany Basem M.56ORCID,Ghoneim Sherif S. M.7ORCID

Affiliation:

1. Rabdan Academy (Homeland Security Department), Abu Dhabi, UAE

2. Ministry of Interior (Smart Security Systems Department), UAE

3. Laboratoire de Technologie Industrielle et de l’Information, Faculté de Technologie, Université de Bejaia, Bejaia 06000, Algeria

4. Department of Electrical Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 807618, Taiwan

5. Department of Electrical Engineering, Faculty of Engineering at Shoubra, Benha University, Cairo 11629, Egypt

6. Electronics and Communication Engineering Department, Kuwait College of Science and Technology, Doha District 35004, Kuwait

7. Electrical Engineering Department, College of Engineering, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia

Abstract

Several security tools have been described in recent times to assist security teams; however, the effectiveness and success remain limited to specific devices. Phishing is a type of cyberattack that uses fraudulent emails and websites to obtain personal information from unsuspecting users, such as passwords and credit card numbers. Hackers can gain access to your information through a variety of methods, and the most common of which are king, phishing, spear phishing, social engineering, and dictionary attacks. Each of these techniques is unique, but they all have the same goal: to obtain your personal information. Nevertheless, there is the potential to exploit this problem in terms of security. In this paper, we used the Bash Bunny (BB), a new tool designed to assist military, law enforcement, and penetration tester teams with their work to conduct exfiltration without privilege escalation through T1200, T1052, and T1052.001 techniques in air-gapped networks with effectiveness/success 99.706%.

Publisher

Hindawi Limited

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems

Cited by 9 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Leveraging CPU Utilization Metrics and Zero Trust Architecture for APT Detection;2023 IEEE 3rd International Conference on Applied Electromagnetics, Signal Processing, & Communication (AESPC);2023-11-24

2. Using AI and Kinetic Energy to Charge Mobile Devices with Human Movement;2023 4th IEEE Global Conference for Advancement in Technology (GCAT);2023-10-06

3. Passivating contact-based tunnel junction Si solar cells using machine learning for tandem cell applications;Energy and AI;2023-10

4. Smart Energy Meets Smart Security: A Comprehensive Review of AI Applications in Cybersecurity for Renewable Energy Systems;International Journal of Electrical and Electronics Research;2023-08-10

5. Artificial Intelligence (AI) and Machine Learning (ML)-based Information Security in Electric Vehicles: A Review;2023 5th Global Power, Energy and Communication Conference (GPECOM);2023-06-14

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3