Vulnerability detection method, device, computer equipment and storage medium

A vulnerability detection and vulnerability technology, applied in the computer field, can solve the problems of security vulnerability detection and limited security vulnerabilities

Active Publication Date: 2020-11-20
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the application program cannot be crawled, the crawler technology cannot detect possible security vulnerabilities in the application server corresponding to the application program, resulting in limited security vulnerabilities that can be detected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method, device, computer equipment and storage medium
  • Vulnerability detection method, device, computer equipment and storage medium
  • Vulnerability detection method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0047] The vulnerability detection method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the agent 104 through the network, and the agent 104 communicates with the server 106 through the network. Wherein, the terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices. The proxy end 104 can be implemented by an independent server or a server cluster composed of multiple servers. The a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a vulnerability detection method and apparatus, computer equipment and a storage medium. The vulnerability detection method includes the steps: capturing a first data packet sent from a terminal; acquiring an attack statement corresponding to a preset vulnerability identifier; adding the attack statement in the first data packet to obtain a second data packet; sending thesecond data packet to a server, wherein the second data packet is used for indicating the server to call an interface to process the second data packet to obtain the processing result; receiving the processing result fed back from the server; and when the processing result accords with the vulnerability characteristic corresponding to the preset vulnerability identifier, determining that a vulnerability corresponding to the preset vulnerability identifier exists in the interface of the server. The vulnerability detection method can detect the preset vulnerability which may exist in the server.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a vulnerability detection method, device, computer equipment and storage medium. Background technique [0002] With the development of computer network technology, the Internet has become very popular, and more and more information is disseminated through the network, resulting in endless network loopholes that may exist in poorly designed network systems, and network security issues need to be resolved urgently. [0003] In the traditional method, crawler technology is usually used to detect possible network vulnerabilities in the web server. However, since the application program cannot be crawled, the crawler technology cannot detect possible security holes in the application server corresponding to the application program, resulting in limited security holes that can be detected. Contents of the invention [0004] Based on this, it is necessary to provide a vul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/57
CPCG06F21/577H04L63/1433
Inventor 崔泷跃
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products