Every attack begins with gathering information about the target. The entry point for network breaches are often vulnerabilities in internet facing websites, which often rely on an off-the-shelf Content Management System (CMS). Bot networks and human attackers alike rely on automated scanners to gather information about the CMS software installed and potential vulnerabilities. To increase the security of websites using a CMS, it is desirable to make the use of CMS scanners less reliable. The aim of this work is to extend the current knowledge about cyber deception in regard to CMS. To demonstrate this, a WordPress Plugin called 'SCANTRAP' was created, which uses simulation and dissimulation in regards to plugins, themes, versions, and users. We found that the resulting plugin is capable of obfuscating real information and to a certain extent inject false information to the output of one of the most popular WordPress scanners, WPScan, without limiting the legitimate functionality of the WordPress installation.
翻译:网络破坏的切入点往往是互联网对网站的脆弱性,这些网站往往依赖现成的内容管理系统(CMS)。 机器人网络和人类攻击者都依靠自动扫描仪收集关于安装的CMS软件和潜在弱点的信息。 为了提高使用CMS网站的安全性,最好降低使用CMS网络的扫描仪的可靠性。 这项工作的目的是扩大有关CMS网络欺骗的现有知识。 为了证明这一点,创建了一个名为“ SCANTRAP”的WordPress插件插件,该插件在插件、主题、版本和用户方面使用模拟和混合。 我们发现,所产生的插件能够混淆真实信息,并在一定程度上将错误信息注入最受欢迎的WordPress扫描器之一(WPScan)的输出中,而不会限制WordPress安装的合法功能。