Nginx server vulnerability detection method and device
A vulnerability detection and server technology, applied in the field of server detection, can solve the problem of inaccurate nginx server vulnerabilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] According to the embodiment of the present invention, an embodiment of the vulnerability detection method that can be used to implement the nginx server of the present application can be provided. It should be noted that the steps shown in the flow chart of the accompanying drawing can be executed in a group of computers such as instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0053] According to an embodiment of the present invention, a vulnerability detection method of an nginx server is provided, such as figure 1 As shown, the method includes the following steps:
[0054] Step S102, sending an access request of the first network address to the nginx server, and obtaining the first content type returned by the nginx server in response to the access request of the first network address.
[0055] Send the access request of the f...
Embodiment 2
[0112] According to an embodiment of the present invention, a device for implementing nginx server vulnerability detection is also provided. The vulnerability detection method in the embodiment of the present invention can be implemented by the vulnerability detection device provided in the embodiment of the present invention, and the vulnerability detection device in the embodiment of the present invention can also be used to execute the vulnerability detection method provided in the embodiment of the present invention.
[0113] Such as figure 2 As shown, the device includes: a first request unit 20 , a second request unit 40 , a first judgment unit 60 and a determination unit 80 .
[0114] The first request unit 20 is configured to send an access request of the first network address to the nginx server, and obtain the first content type returned by the nginx server in response to the access request of the first network address.
[0115] Send the access request of the first...
Embodiment 3
[0162]According to an embodiment of the present invention, a system is also provided, and the system includes a terminal 100 and an nginx server 300 . Figure 4 It is a sequence diagram of interaction between a terminal and an nginx server according to an embodiment of the present invention.
[0163] As shown in the figure, the terminal 100 sends an access request of the first network address to the nginx server 300, and acquires the first content type returned by the nginx server 300. Afterwards, the terminal 100 sends an access request of the second network address to the nginx server 300, and acquires the second content type returned by the nginx server 300.
[0164] After obtaining the first content type and the second content type, it is judged whether the first content type and the second content type are the same, if the first content type and the second content type are different, then it is determined that the nginx server 300 has a loophole.
[0165] The terminal 10...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 