A method, device and electronic equipment for mining vulnerabilities
A vulnerability and data technology, applied in computer security devices, electronic digital data processing, instruments, etc., can solve the problems of high vulnerability cost, inability to exploit vulnerability, and low efficiency in vulnerability mining.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0083] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0084] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0085] figure 1 It is a schematic flowchart of a method for mining vulnerabilities according to an embodiment of the present invention. see figure 1 , the method includes:
[0086] Step 11, injecting a preset data interception processing script into the data receiving interface of the server;
[0087] In this step, the pre-set data interception processing script is injected into the data receiving interface of the server (for example, the recv interface), so that the injected data interception processing script ca...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


