Characteristics of MSFVenom software for Linux/ARM architecture and its application for complete exploit design

Read the full article See related articles

Discuss this preprint

Start a discussion What are Sciety discussions?

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

Security issues for Cyber Physical System (CPS) against memory corruption attack pose significant challenges in ensuring both system performance and data security. This article presents the in-depth analysis and new critical characteristics of the MSFVenom software for penetration testing of Linux/ARM architecture systems. This software is a fundamental tool for verification of resilience of various system architectures but is underdeveloped for the Linux/ARM architecture. MSFVenom's malfunctioning functionalities may mislead penetration testers who fail to detect or underestimate a vulnerability in a device that could actually be a major threat to cyber-attack. New problems were identified at the level of description in the documentation but, most importantly, of erroneous operation despite correct parameterization. Considering the huge growing demand for energy-efficient ARM processors, it is essential to highlight the MSFVenom software's limitations for verifying the resilience of systems against hacking attacks. The article presents a new testing method supplemented with the complete instruction for practitioners to fully develop exploit to confirm the existing vulnerability. This can significantly increase the level of cyber security in general but also in communication networks.

Article activity feed