<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Knife to improve Cyber Security Education</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Danilo Caivano</string-name>
          <email>danilo.caivano@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Adriano Gentile</string-name>
          <email>gentile97@studenti.uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gennaro Del Campo</string-name>
          <email>r.delcampo@serandp.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Davide Pio Posa</string-name>
          <email>d.posa3@studenti.uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonio Piccinno</string-name>
          <email>antonio.piccinno@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Cybersecurity, Red team Knife, Education, Cyber Kill Chain</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, University of Bari Aldo Moro</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>SER&amp;Practices, Spin-of of the University of Bari Aldo Moro</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>The increasing ubiquity of digital systems in daily life has significantly expanded the attack surface for cyber threats, demanding new tools and methodologies for efective defense. Traditional security practices are no longer suficient in the face of evolving and sophisticated cyberattacks. Therefore, this paper introduces Red Team Knife (RTK), a tool designed to support cybersecurity education and practice by guiding users-both novices and experts-through structured penetration testing activities aligned with the Cyber Kill Chain model. RTK integrates widely-used red teaming tools (e.g., Nmap, Sqlmap, theHarvester) within a user-friendly graphical interface built on the MVC paradigm. It provides contextual guidance and execution support to enhance usability and streamline pentesting workflows. The tool was tested on vulnerable virtual machines (XVWA and OWASP BWA), demonstrating its ability to identify security flaws, assist users with targeted hints, and maintain a persistent knowledge base through result saving and restoration features. RTK represents a valuable contribution to cybersecurity training and operational eficiency. Providing a guided, modular, and extensible environment for penetration testing improves educational outcomes and real-world security assessments.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        It is undeniable that the ubiquity of computer systems in our daily lives has created new challenges for
security professionals [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Where once the protection of sensitive documents was primarily a matter of
choosing a lock that was resistant to physical attack, today the same challenge arises in a very diferent
and highly digital context [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Digital technologies have radically changed the security landscape
and introduced a new type of vulnerability. Rather than being physically stored in a specific location,
document archives are now virtual and accessible from anywhere in the world via the Internet. This
change has necessitated a new perspective on data protection, requiring computer security professionals
to adapt to a rapidly changing environment continually[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In addition to changing vulnerabilities,
the tools available to security professionals are also constantly changing. In today’s environment, a
cybersecurity professional must not only be aware of evolving digital threats, but also master the tools
and techniques needed to efectively counter them [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        In this dynamic scenario, knowledge of the available ’tools’ becomes critical. Computer security
professionals must be able to use a wide range of tools and technologies to protect data and digital
infrastructures efectively [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Among computer security methodologies, penetration testing is emerging
as a critical approach to assessing the efectiveness of an organization’s defenses. This practice,
commonly known as ’pentesting’, consists of conducting simulations of controlled cyber-attacks in
order to identify vulnerabilities and weaknesses in systems, thus enabling organisations to take targeted
corrective action and strengthen their defences.
      </p>
      <p>This research work aims to provide a set of tools that are accessible to both novices and experts
performing computer system security testing, to ensure a more uniform and consistent workflow,</p>
      <p>CEUR</p>
      <p>ceur-ws.org
similar to being guided by a ’compass’. The efectiveness of this ’Red Team Knife’ will be tested by
pentesting a real platform to produce a security report that identifies any existing vulnerabilities and
associated risks.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Cyber Kill Chain</title>
      <p>
        The Cyber Kill Chain model, originally developed to analyze cyber threats, consists of seven stages:
Reconnaissance, Weaponization, Delivery, Exploit, Installation, Command &amp; Control, and Actions
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This model enhances visibility into attacks and enriches analysts’ understanding of adversary
tactics [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. However, its sequential nature limits its efectiveness against advanced persistent threats,
leading to the proposal of a concurrent analysis model that mimics human mental processes [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The
integration of Artificial Intelligence (AI) along the Cyber Kill Chain shows promise in enhancing defense
capabilities, particularly in reconnaissance, intrusion, privilege escalation, and data exfiltration stages
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Understanding the technical aspects of each stage, including methodologies, techniques, and tools,
is crucial for developing efective incident response and analysis capabilities [ 10]. When combined
with advanced analytics and predictive modeling, the Cyber Kill Chain becomes critical for inside-out
security [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Seven phases are defined in the cyber kill chain [ 11]:
1. Reconnaissance. The attacker gathers information about the target, such as vulnerabilities, system
configurations, and user details, to plan the attack.
2. Weaponization. Malicious tools are created by the attacker, like malware or ransomware, to
exploit the identified vulnerabilities.
3. Delivery. The malicious payload is delivered to the target, often through phishing emails, malicious
links, or exploiting software vulnerabilities.
4. Exploitation. The malicious code is executed on the target system, exploiting the vulnerabilities
to gain unauthorized access.
5. Installation. Malware or other malicious components are installed on compromised systems.
6. Command and Control (C2). The attacker establishes communication channels to control
compromised systems and execute their plans.
7. Actions on Objectives. The attacker achieves their goals, such as data theft, system disruption, or
ifnancial gain.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Red Team Knife (RTK)</title>
      <p>A penetration test (or pentest) is an authorized simulated cyberattack on a computer system, performed
to evaluate the security of the system. The pentest is performed to identify weaknesses or vulnerabilities,
including the potential for unauthorized parties to gain access to the system’s features and data. Thus
enabling a comprehensive risk assessment to be carried out.</p>
      <p>Red Team Knife1 serves as an interface to a range of valuable red teaming tools (Figure 1), including:
Nmap, Nmap vulnerability scanner, Feroxbuster, theHarvester, Dig, w4af, SMTP Email spoofer, Commix,
Sqlmap. Therefore, the aim of Red Team Knife (RTK) is to provide a set of tools accessible experts and
non-experts in cybersecurity activities performing security inspections on systems. It is evident that,
despite the wide availability of accessible tools for penetration testing, there is a lack of a platform
that provides comprehensive and structured support to perform a security analysis. Indeed, existing
platforms are not yet well-established, or are only specialised in certain areas.</p>
      <p>Therefore, the idea behind RED Team Knife emerged from the need to have a guideline during
penetration testing activities. Despite the wide availability of publicly accessible tools, there is a lack
of a platform that provides complete and structured support for conducting a security analysis. The
existing platforms are either not yet established or are only specialised in certain areas. The aim of</p>
      <sec id="sec-3-1">
        <title>1https://github.com/Red-Team-Knife/red_team_knife</title>
        <p>‘Red Team Knife’ is, therefore, to provide an organic and interconnected set of tools, which intelligently
guides the pentester during use.</p>
        <p>These features can be useful both for those who are approaching the discipline of computer security
for the first time, often in need of useful indications that are dificult to find immediately from other
sources, and for those who already have experience in the field and simply want an improvement in
their workflow, which can be greatly enhanced and extended with an efective graphic interface. The
tool is designed to guide the user through the steps of the Cyber Kill Chain.</p>
        <p>Finally, Red Team Knife aims to ofer the possibility of saving and restoring, without excessive efort,
the scans performed, so as to conduct an all-round analysis of the system concerned, keeping the results
in a cohesive knowledge base.</p>
        <p>RTK provides guidelines in the execution of penetration testing with respect to the phases of the
Cyber Kill Chain. The tools made available to the user have been linked by providing useful hints
proposing a possible continuation after a satisfactory result has been found. It is important to note that
the w4af tool can make the user ’backtrack’ to the use of Dig. This is because the tool provides useful
information for both reconnaissance and weaponisation (Figure 2).</p>
        <p>The adopted architectural paradigm is inspired by the MVC (Model-View-Controller) pattern, which
comprises three principal components: Model, View and Controller. The Model is responsible for
encapsulating the domain-specific structure and implementing the application functionality, i.e. the
state and operations that can change the state, using an Observer pattern. The Model also maintains
dependencies with the Controller and the View, which notifies of the change of state. The View is
responsible for presenting information via a graphical interface, and when the information contained
in the View undergoes an update by the responsible Model, the View receives a notification and will
change its representation appropriately. Finally, the Controller is responsible for responding to actions
that the user performs on the graphical interface.</p>
        <p>In particular, the general operating principle of the application is based on the encapsulation of the
tools by a controller, which manages the execution, locking and retrieval of the results.</p>
        <p>Most of the included tools have command-line interfaces whose results, provided on standard output,
are dificult to examine and de-serialise. To overcome this problem, the possibility of saving the results
of the tool’s execution to a file was exploited, which we refer to in our context as temp_file . The
operation of the controller is thus as follows: receives an execution request in which target and options
are specified; creates the command to be executed by formatting the options correctly; initialises a
thread instance in which to execute a command with subprocessṖopen(); communicates with the thread
to report any required stops; retrieves data from the temp_file that the command generated and stores
it appropriately.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experimentation</title>
      <p>Preliminary testing of the system’s operation was carried out using XVWA2 and the OWASP Broken
Web Applications project3, by means of some virtual machines available online.</p>
      <p>XVWA, an acronym for Xtreme Vulnerable Web Application, is a web application developed in
PHP/MySQL with intentional vulnerabilities. It was specially designed to help computer security
beginners in their learning. The ‘Live ISO’ version was used to start a virtual machine and use the
service.</p>
      <p>Both target machines were used for testing the integrated tools. Below is an example of the results of
the vulnerability scan on XVWA with Nmap.</p>
      <p>The SQL Injection section of XVWA makes it possible to clearly identify the parameter and type of
request required to execute the attack. Below is an example of a hint command for running a shell via
SQLMap (Figure 4).</p>
      <p>The OS Command Injection section of XVWA has the same features as mentioned above, so it is an
excellent target on which to test the tool’s operation (Figure 5).</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>The Red Team Knife (RTK) is designed to provide both beginners and experienced professionals in
cybersecurity with an accessible, structured, and integrated set of tools for penetration testing. It
enhances the penetration testing workflow by ofering guidance along the Cyber Kill Chain, supports</p>
      <sec id="sec-5-1">
        <title>2https://github.com/s4n7h0/xvwa 3https://github.com/chuckfw/owaspbwa</title>
        <p>saving/restoring results, and wraps command-line tools in a more user-friendly interface using an
MVC-based architecture.</p>
        <p>Preliminary experimentation on known vulnerable platforms (like XVWA and OWASP BWA)
demonstrated its usefulness in identifying vulnerabilities and guiding users through exploitation steps.</p>
        <p>Overall, RTK aims to support cybersecurity education and practice by acting as a compass for efective
and educational penetration testing activities.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This work was partially supported by the following projects: SERICS - “Security and Rights in the
CyberSpace - SERICS” (PE00000014) under the MUR National Recovery and Resilience Plan funded by
the European Union - NextGenerationEU; Accordo Quadro CrASte - “Cyber Academy for Security and
Intelligence”.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <sec id="sec-7-1">
        <title>The author(s) have not employed any Generative AI tools.</title>
        <p>Computational Collective Intelligence, Springer International Publishing, Cham, 2019, pp. 406–416.
[10] T. Yadav, A. M. Rao, Technical aspects of cyber kill chain, in: J. H. Abawajy, S. Mukherjea,
S. M. Thampi, A. Ruiz-Martínez (Eds.), Security in Computing and Communications, Springer
International Publishing, Cham, 2015, pp. 438–452.
[11] E. M. Hutchins, M. J. Cloppert, R. M. Amin, et al., Intelligence-driven computer network
defense informed by analysis of adversary campaigns and intrusion kill chains, Leading Issues in
Information Warfare &amp; Security Research 1 (2011) 80.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Raguseo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Scalera</surname>
          </string-name>
          ,
          <article-title>Teaching cyber security: The hack-space integrated model</article-title>
          , volume
          <volume>2315</volume>
          ,
          <year>2019</year>
          . URL: https://www.scopus.com/inward/record. uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85061370504</lpage>
          &amp;partnerID=
          <volume>40</volume>
          &amp;md5=
          <fpage>e8da8bde8df7b4a276e5517e34136832</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Scalera</surname>
          </string-name>
          ,
          <article-title>Privacy knowledge base for supporting decision-making in software development</article-title>
          , in: C. Ardito,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lanzilotti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Malizia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Larusdottir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. D.</given-names>
            <surname>Spano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Campos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hertzum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Mentler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Abdelnour</given-names>
            <surname>Nocera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Piccolo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sauer</surname>
          </string-name>
          , G. van der Veer (Eds.), Sense, Feel, Design, Springer International Publishing, Cham,
          <year>2022</year>
          , pp.
          <fpage>147</fpage>
          -
          <lpage>157</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -98388-8_
          <fpage>14</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Scalera</surname>
          </string-name>
          ,
          <article-title>Privacy oriented software development</article-title>
          , in: M.
          <string-name>
            <surname>Piattini</surname>
          </string-name>
          , P. Rupino da Cunha, I. García Rodríguez de Guzmán, R. Pérez-Castillo (Eds.),
          <source>Quality of Information and Communications Technology</source>
          , Springer International Publishing, Cham,
          <year>2019</year>
          , pp.
          <fpage>18</fpage>
          -
          <lpage>32</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -29238-
          <issue>6</issue>
          _
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Catalano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chezzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Tommasi</surname>
          </string-name>
          ,
          <article-title>Defeating fido2/ctap2/webauthn using browser in the middle and reflected cross site scripting</article-title>
          ,
          <source>Journal of Computer Virology and Hacking Techniques</source>
          <volume>21</volume>
          (
          <year>2025</year>
          )
          <article-title>11</article-title>
          . URL: https://doi.org/10.1007/s11416-025-00556-2. doi:
          <volume>10</volume>
          .1007/ s11416- 025- 00556- 2.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Calvano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Curci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          , Craste:
          <article-title>Human factors and perception in cybersecurity education</article-title>
          , volume
          <volume>3713</volume>
          ,
          <year>2024</year>
          , p.
          <fpage>75</fpage>
          -
          <lpage>81</lpage>
          . URL: https://www.scopus.com/inward/ record.uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85198753881</lpage>
          &amp;partnerID=
          <volume>40</volume>
          &amp;md5=
          <fpage>35f9b858e583d214bb7a53c0a7dbf0da</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>I. Tarnowski</surname>
          </string-name>
          ,
          <article-title>How to use cyber kill chain model to build cybersecurity?</article-title>
          ,
          <source>European Journal of Higher Education IT</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Siddiqui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Ferens</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Cognitive</surname>
          </string-name>
          <source>and Concurrent Cyber Kill Chain Model</source>
          , Springer International Publishing, Cham,
          <year>2018</year>
          , pp.
          <fpage>585</fpage>
          -
          <lpage>602</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -58424-9_
          <fpage>34</fpage>
          . doi:
          <volume>10</volume>
          .1007/978- 3-
          <fpage>319</fpage>
          - 58424- 9_
          <fpage>34</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>M. M. S. Khan</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          <string-name>
            <surname>Giraldo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Parvania</surname>
          </string-name>
          ,
          <article-title>Real-time cyber-physical analysis of distribution systems using digital twins</article-title>
          ,
          <source>2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)</source>
          (
          <year>2022</year>
          )
          <fpage>34</fpage>
          -
          <lpage>39</lpage>
          . URL: https://api. semanticscholar.org/CorpusID:254153621.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>I.</given-names>
            <surname>Chomiak-Orsa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Blaicke</surname>
          </string-name>
          ,
          <article-title>Artificial intelligence in cybersecurity: The use of ai along the cyber kill chain</article-title>
          , in: N. T. Nguyen,
          <string-name>
            <given-names>R.</given-names>
            <surname>Chbeir</surname>
          </string-name>
          , E. Exposito,
          <string-name>
            <given-names>P.</given-names>
            <surname>Aniorté</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          Trawiński (Eds.),
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>