Vulnerability disclosure system and method aiming at network protocol
A vulnerability mining and network protocol technology, applied in transmission systems, electrical components, etc., can solve the problems of inability to capture network communication data, inability to automate vulnerability mining of unknown network protocols, inability to apply a wide range of network protocol applications, etc., to improve efficiency. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.
[0026] figure 1 A block diagram of a vulnerability mining system 100 for network protocols according to an embodiment of the present invention is schematically shown. Such as figure 1As shown, the vulnerability mining system 100 includes a client 112 and a server 132 that communicate through a network protocol for vulnerability mining. According to the characteristics of network protocols, devices using network protocols for communication can be logically divided into clients and servers, and even P2P protocols can be divided according to this logic. Generally speaking, the client 112 first initiates a communication request to the server 132 , and then the server 132 returns communication data to the client 112 in response to the request of the client 112 .
[0027] The vulnerability mining system 100 also includes a middleman controller 1...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 