Vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in the direction of transmission system, electrical components, etc., to achieve the effect of high coverage

Active Publication Date: 2020-12-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a loophole detection method and device for the technical problem that the current loophole detection method can detect few loopholes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0030] Such as figure 1 As shown, in one embodiment, a vulnerability detection system 100 is provided, including a terminal 102 and a server 104 , and the terminal 102 can access the server 110 to be detected through the server 104 . In one embodiment, the terminal 102 includes a desktop computer and a mobile terminal, and the mobile terminal includes a mobile phone, a tablet computer, a smart watch, an e-reader, and the like.

[0031] In one embodiment, the structure of the server 104 is as figure 2 As shown, it includes a processor, an internal memory, a non-volatile storage medium and a netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a loophole detection method and device. The method includes: receiving a user access network request sent by a terminal in a forward proxy mode; recording the user access network request; generating a loophole detection network request according to the recorded user access network request; Send the vulnerability detection network request to the server to be detected corresponding to the user access network request; receive the vulnerability detection response information fed back by the server to be detected according to the vulnerability detection network request; detect the vulnerability detection response information Whether it has the preset vulnerability signature in the preset vulnerability signature database, and obtain the vulnerability detection result. The loophole detection method and device provided by the present invention perform loophole detection with the help of user access network requests generated by users in various scenarios, avoiding the situation that loophole detection cannot be performed due to the need for user login, and the coverage rate of loophole detection is high .

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a loophole detection method and device. Background technique [0002] With the rapid development of the mobile Internet, mobile applications have also developed rapidly, and a large number of mobile applications with different functions have emerged. However, the development of mobile applications makes mobile applications face various security risks. The current security risks are mainly vulnerabilities on the server side, including WEB (website) vulnerabilities and server vulnerabilities caused by various API (application programming interface) interfaces. Malicious users can use these vulnerabilities to obtain user privacy, phishing fraud, and invade servers to steal core source codes or user databases, etc., causing great harm. [0003] At present, the packet capture tool can be used to capture the data packets transmitted in the network, and then perform vulnerabi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/10H04L65/1045
Inventor 郑兴
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products