Vulnerability detection method and device

A technology of vulnerability detection and vulnerability, applied in the field of computer security, to achieve the effect of high coverage

Active Publication Date: 2017-01-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a loophole detection method and device...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0030] Such as figure 1 As shown, in one embodiment, a vulnerability detection system 100 is provided, including a terminal 102 and a server 104 , and the terminal 102 can access the server 110 to be detected through the server 104 . In one embodiment, the terminal 102 includes a desktop computer and a mobile terminal, and the mobile terminal includes a mobile phone, a tablet computer, a smart watch, an e-reader, and the like.

[0031] In one embodiment, the structure of the server 104 is as figure 2 As shown, it includes a processor, an internal memory, a non-volatile storage medium and a netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a vulnerability detection method and device, and the method comprises the steps: receiving a user network access request transmitted by a terminal in a forward proxy mode; recording the user network access request; generating a vulnerability detection network request according to the recorded user network access request; transmitting the vulnerability detection network request to a to-be-detected server corresponding to the user network access request; receiving the vulnerability detection response information fed back by the to-be-detected server according to the vulnerability detection network request; detecting whether the vulnerability detection response information has the preset vulnerability features in a preset vulnerability feature database or not, and obtaining the vulnerability detection result. The method and device provided by the invention employ the user network access requests, generated in various types of scenes, of users to carry out the vulnerability detection, avoids a condition that the vulnerability detection cannot be carried out because the users need to log in a system, and is high in vulnerability detection coverage rate.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a loophole detection method and device. Background technique [0002] With the rapid development of the mobile Internet, mobile applications have also developed rapidly, and a large number of mobile applications with different functions have emerged. However, the development of mobile applications makes mobile applications face various security risks. The current security risks are mainly vulnerabilities on the server side, including WEB (website) vulnerabilities and server vulnerabilities caused by various API (application programming interface) interfaces. Malicious users can use these vulnerabilities to obtain user privacy, phishing fraud, and invade servers to steal core source codes or user databases, etc., causing great harm. [0003] At present, the packet capture tool can be used to capture the data packets transmitted in the network, and then perform vulnerabi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/10H04L65/1045
Inventor 郑兴
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products