System and method for safety testing based on database injection testing

A technology of safety testing and database, applied in the direction of electrical digital data processing, computer safety devices, instruments, etc., can solve the problems of increasing safety testing time, inconvenient safety testing work, too simple, etc., to achieve the effect of high efficiency

Inactive Publication Date: 2017-09-08
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In security testing, database injection testing will be used as a frequently used security testing method. Testers can use this method to simulate hackers to attack and verify whether the tested URL directly puts the parameters submitted by the user into the SQL statement without filtering. As a result, the special characters in the parameters break the original logic of the SQL statement, and the hacker exploits this vulnerability to execute any SQL statement, thereby improving the security level of the website under test; however, many cloud business systems have deployed WAF or are already in The code function of data verification is deployed on the cloud. Since the WAF or cloud business security code filters many common special characters, the special database construction statement based on database injection cannot be correctly parsed and the database statement is generated and submitted in the cloud business system. Go to the background database for legal execution, resulting in the failure of the database injection test; the current database injection test statement, either provides basic special characters, or only has a simple database construction statement, which can only be used for WAF or no database injection filtering mechanism Many of these statements are too simple and increase the time for security testing. Taking the popular database injection tools D and Ming Xiaozi as examples, the database injection test statements are just simple single quotes, and, or and other statements; due to the existence of WAF, these special words are usually escaped, and the database statement generated by the cloud business system cannot be legally executed after being submitted to the database; Test work brings a lot of inconvenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for safety testing based on database injection testing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0024] Such as figure 1 As shown, a security testing system based on database injection testing includes a cloud-based defended business system and several clients, the client is connected to the cloud-based defended business system through network communication, and the client includes a response monitoring module, A message identification module, an information collection module, an information construction module, and an information sending module; the client has a service system to be tested inside, and the service system to be tested includes a request message, and the request message includes response data and data flow information ; The cloud is used by the defense business system for database injection testing; the client is installed or integrated on the target to be tested in the form of a software development kit SDK, and the target to be tested includes a website, a server, a terminal device or an application software.

[0025] The response monitoring module is us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and method for safety testing based on database injection testing. The system comprises a cloud side defended service system and multiple client sides, wherein the client sides are in network communication connection with the cloud side defended service system, and each client side comprises a responding and monitoring module, a message recognition module, an information collection module, an information construction module and an information sending module; the client side comprises a to-be-tested service system, the to-be-tested service system comprises a request message, and the request message comprises response data and data flow information; and the cloud side defended service system is used for the database injection testing. According to the invention, in the cloud side database injection testing, database injection construction methods with multiple types and encoding manners can be traversed quickly and automatically; manual judgment of a database filtering mechanism is omitted; and the safety testing becomes efficient, rapid and accurate.

Description

technical field [0001] The invention relates to the technical field of computer software information, in particular to a security testing system and method based on database injection testing. Background technique [0002] With the development of network and computer software information technology, network security has attracted more and more attention and attention, and related security testing has become more and more necessary. In security testing, database injection testing will be used as a frequently used security testing method. Testers can use this method to simulate hackers to attack and verify whether the tested URL directly puts the parameters submitted by the user into the SQL statement without filtering. As a result, the special characters in the parameters break the original logic of the SQL statement, and the hacker exploits this vulnerability to execute any SQL statement, thereby improving the security level of the website under test; however, many cloud bus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 丁锐常清雪师洛蓓
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products