Penetration test method in allusion to mobile geographic information security of underground pipelines

A penetration testing and geographic information technology, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems such as inability to penetrate testing, and inability of scanner crawlers to crawl links, to prevent data leakage and ensure system security. Effect

Inactive Publication Date: 2016-06-01
BEIJING INST OF RADIO METROLOGY & MEASUREMENT
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The underground pipeline mobile app interacts with the server in the form of web services. The server is also a website for displaying information. Common web vulnerabilities also exist on the server, such as SQL (Structured Query Language) injection, file upload, middleware/server Vulnerabilities, etc., but

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Penetration test method in allusion to mobile geographic information security of underground pipelines
  • Penetration test method in allusion to mobile geographic information security of underground pipelines
  • Penetration test method in allusion to mobile geographic information security of underground pipelines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to illustrate the present invention more clearly, the present invention will be further described below in conjunction with preferred embodiments and accompanying drawings. Similar parts in the figures are denoted by the same reference numerals. Those skilled in the art should understand that the content specifically described below is illustrative rather than restrictive, and should not limit the protection scope of the present invention.

[0030] Such as figure 1 As shown, the testing system adopted in the penetration testing method for underground pipeline mobile geographic information security provided in this embodiment includes a server 1 , a mobile terminal 2 and a testing machine 3 . The mobile terminal 2 is usually a mobile phone or a tablet computer held by a professional professional engaged in mobile geographic information security work of underground pipelines. The testing machine 3 is used for testers to perform penetration testing on the securi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a penetration test method in allusion to mobile geographic information security of underground pipelines. The method comprises the following steps: changing the suffix of an APK file into zip and decompressing the compressed file to obtain a class.dex file therein; copying the class.dex file into a catalogue to which a dex2jar.bat file belongs, executing a dex2jar class.dex command under a command line, and generating a class-dex2jar.jar file under the current catalogue; opening a jd-gui code check tool, importing the class-dex2jar.jar file and checking a reversed application source code; setting the address of a test machine and collecting a server-side interface list by utilizing the test machine; and carrying out vulnerability scanning on a server by using a burp suit tool through the server-side interface list, outputting a vulnerability analysis statement to the test machine, and carrying out sql injection test on a server side by utilizing a sqlmap tool so as to detect the sql injection vulnerabilities. The penetration test method is capable of finding the vulnerabilities of the application service programs on the underground pipeline map servers in allusion to the mobile GIS applications which carry underground pipeline route data, so as to prevent the data leakage of the underground pipelines.

Description

technical field [0001] The invention relates to the technical field of underground pipeline mobile geographic information security testing. More specifically, it relates to a penetration testing method for mobile geographic information security of underground pipelines. Background technique [0002] With the acceleration of the urbanization process, various urban pipe networks overlap and crisscross, chaotically vying for the limited underground space in the city. In recent years, underground pipeline accidents have occurred frequently, resulting in problems such as explosions, fires, and toxic gas emissions, which have seriously endangered the lives of the people. The use of traditional geographic information system (GIS) technology has been unable to meet the daily pipeline operation and maintenance management. [0003] In the existing technology, mobile GIS is supported by the mobile Internet, with smart phones or tablet computers as terminals, and combined with Beidou,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 张帆杨帆
Owner BEIJING INST OF RADIO METROLOGY & MEASUREMENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products