Multimedia message protocol failing mining method and system thereof
A vulnerability mining, MMS technology, applied in transmission systems, digital transmission systems, wireless network protocols, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0046] 1. The specific implementation process of Fuzzing test
[0047] figure 1 The Fuzzing test implementation process adopted for the vulnerability mining of MMS service is given. First of all, the MMS protocol must be analyzed in detail to understand the types of MMS messages, the composition and meaning of the fields in each message. Please refer to the technical document Multimedia MessagingService Encapsulation Specification provided by the Open Mobile Alliance (OMA) for a detailed description of the MMS protocol format, and will not be repeated here. The second is to determine the vulnerable point to be tested, and construct the malformed data according to the vulnerable point. The malformed data is designed to be a legal MMS protocol data packet. The difference from the normal data packet is that one or more specified fields in the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 