Method and system for detecting website vulnerability

A technology of website vulnerability and detection method, which is applied in the field of website vulnerability detection and website vulnerability detection system, can solve the problems of flooding of illegal operations and achieve the effects of reducing the number of decoding operations, improving accuracy and improving security

Inactive Publication Date: 2015-04-22
BEIJING QIANXIN TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, illegal operations on Base64-encoded links are relatively easy and widespread,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting website vulnerability
  • Method and system for detecting website vulnerability
  • Method and system for detecting website vulnerability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The embodiments of the present invention will be described in detail below. Examples of the embodiments are shown in the accompanying drawings, wherein the same or similar reference numerals indicate the same or similar elements or elements with the same or similar functions. The embodiments described below with reference to the accompanying drawings are exemplary, and are only used to explain the present invention, and cannot be construed as limiting the present invention.

[0063] Those skilled in the art can understand that, unless specifically stated otherwise, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the term "comprising" used in the specification of the present invention refers to the presence of the described features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, el...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and system for detecting website vulnerability. The method includes the steps of obtaining a to-be-detected website link, wherein the website link is in a Base64 coded format; carrying out decoding for the website link to recognize parameters in the website link; adding a testing character string into the parameters of the website link to form a testing link; carrying out Base64 coding on the testing link to form a coded testing link; and detecting whether a website has the vulnerability or not according to the coded testing link. By means of the technical scheme of the method and system, the vulnerability in the Base64 link can be accurately detected, and the network information interaction safety degree can be improved.

Description

Technical field [0001] The present invention relates to the technical field of network security, in particular to a method for detecting website vulnerabilities and a system for detecting website vulnerabilities. Background technique [0002] During the transmission of network data, some gateways only allow the transmission of ASCII characters, that is, the lower 7 bits of an 8-bit byte. The Base64 encoding method can encode most data to achieve ASCII character conversion and transmission. Base64 is an encoding method used to transmit 8Bit byte codes, which can be used to transmit longer identification information in an HTTP (Hypertext Transfer Protocol) environment. For example, in the Java Persistence system Hibernate, Base64 can be used to encode a longer unique identifier into a string, which is used as a parameter in HTTP forms and HTTP GET URLs. [0003] In the application, Base64 can encode binary data into a form suitable for placing in the URL, and Base64-encoded links ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F17/30
CPCG06F21/577G06F16/9566
Inventor 王泽
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products