Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, device and electronic equipment for mining vulnerabilities

A vulnerability and data technology, applied in computer security devices, electronic digital data processing, instruments, etc., can solve the problems of high vulnerability cost, inability to exploit vulnerability, and low efficiency in vulnerability mining.

Active Publication Date: 2018-09-25
ZHUHAI BAOQU TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in this vulnerability mining method, since a network connection needs to be established between the client and the server, and the same network protocol as that in the server needs to be configured in the client, the cost of detecting vulnerabilities in the server is relatively high. Faults or abnormalities will make vulnerability mining impossible, resulting in low efficiency of vulnerability mining

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and electronic equipment for mining vulnerabilities
  • A method, device and electronic equipment for mining vulnerabilities
  • A method, device and electronic equipment for mining vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0084] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0085] figure 1 It is a schematic flowchart of a method for mining vulnerabilities according to an embodiment of the present invention. see figure 1 , the method includes:

[0086] Step 11, injecting a preset data interception processing script into the data receiving interface of the server;

[0087] In this step, the pre-set data interception processing script is injected into the data receiving interface of the server (for example, the recv interface), so that the injected data interception processing script ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and a device for exploiting vulnerability and an electronic device. The method comprises the following steps of injecting a preset data interception processing script in a data receiving interface of a server; running the injected data interception processing script, and enabling the data interception processing script to intercept data sent to the data receiving interface of the server; carrying out fuzzy processing on the intercepted data, and calling the data receiving interface of the server to submit the data which are subjected to the fuzzy processing; running the data which are subjected to the fuzzy processing, obtaining running result information, and judging whether the server has the vulnerability or not based on the running result information. By applying the method disclosed by the invention, the vulnerability detecting cost is reduced, and the vulnerability exploiting efficiency is increased.

Description

technical field [0001] The invention relates to computer loophole mining technology, in particular to a method, device and electronic equipment for mining loopholes. Background technique [0002] With the rapid development of computer network technology, the Internet has gradually become an indispensable part of people's work and life. However, due to the complexity of the Internet application environment and the diversity of Internet application programs, the application programs in electronic devices are vulnerable to network vulnerability attacks and threats such as computer viruses and Trojan horses. Among them, the vulnerability refers to the functional or security logic defects in the application program. Using the vulnerability mining technology, the loopholes or potential loopholes in the application program can be discovered and repaired in time, which is very important for protecting the personal information security and property of Internet users. Safety has a po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 王鑫
Owner ZHUHAI BAOQU TECH CO LTD