Method and device for system penetration testing

A penetration testing and system technology, applied in the field of system penetration testing, can solve the problems of network paralysis, harmful network security, unhelpful computer technology development, etc.

Active Publication Date: 2014-08-27
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF3 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Now, more and more crackers appear on the Internet. They invade computer systems, use scanners to scan everywhere, bomb people with IP bombs, invade and destroy without any purpose. They are not beneficial to the development of computer technology, but instead Harmful to network security and cause network paralysis, bring huge economic and spiritual losses to people

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for system penetration testing
  • Method and device for system penetration testing
  • Method and device for system penetration testing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention can be further understood through the specific examples of the present invention given below, but they are not intended to limit the present invention. Some non-essential improvements and adjustments made by those skilled in the art based on the above content of the invention are also deemed to fall within the protection scope of the present invention.

[0029] Please refer to Fig. 1, embodiment of the present invention, a kind of method for system penetration test, comprises:

[0030] S1. Use a variety of public resources to obtain system test target information;

[0031] After delineating the scope of the test, an information reconnaissance phase is required. At this stage, penetration testers need to use various public resources to obtain more information about the test target, which can be gleaned from the Internet, such as forums, blogs, social networks, and other commercial or non-commercial websites.

[0032] In addition, relevant data can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for system penetration testing, comprising the following steps: S1, test target information of a system is acquired by use of a variety of public resources; S2, network information of a system test target is extracted; S3, online network host information of the system is detected; S4, all open ports of the system are scanned, and all services are enumerated through all the ports to position and analyze a loophole in the target system; and S5, the target system is penetrated by a loophole device. The invention further discloses a device for system penetration testing. By adopting the method and the device, provided by the invention, for system penetration testing, through static analysis of a source code, on one hand, potential risks can be identified, software can be detected from inside, and the safety of the code can be improved, and on the other hand, the quality of the code can be further improved, and the software security can be greatly improved.

Description

technical field [0001] The invention relates to the field of source code security, in particular to a method, device and system for system penetration testing. Background technique [0002] Now, more and more crackers appear on the Internet. They invade computer systems, use scanners to scan everywhere, bomb people with IP bombs, invade and destroy without any purpose. They are not beneficial to the development of computer technology, but instead It is detrimental to the security of the network and causes network paralysis, which brings huge economic and spiritual losses to people. The means of attack can be divided into two categories: non-destructive attack and destructive attack. Non-destructive attacks are generally used to disrupt the operation of the system without stealing system data, usually using denial of service attacks or information bombs; destructive attacks are aimed at invading other people's computer systems, stealing system confidential information, and d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 王甜魏理豪朱奕崔磊邹洪艾解清周开东张超梁哲恒
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products