Penetration test method and device

A penetration testing and testing terminal technology, applied in the field of network security, can solve the problems of interrupting the thinking of penetrating personnel, discontinuous penetration testing process, and fragmented implementation steps, so as to shorten time and labor costs and realize the effect of automated penetration testing

Active Publication Date: 2019-01-01
BEIJING KNOWNSEC INFORMATION TECH
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in related technologies, the penetration testing process is discontinuous. After completing the test of an attack point, it is necessary to manually verify whether it is successful. If it is successful, it can be verified at a deeper attack level. If it is unsuccessful, it needs to return to consider other methods. Conduct penetration testing, which tends to consume a lot of time and can interrupt the penetrator's train of thought
It can be seen that the implementation steps of penetration testing in related technologies are too fragmented and the labor cost is too high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Penetration test method and device
  • Penetration test method and device
  • Penetration test method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054]In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0055] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a penetration test method and device. According to the invention, a test terminal generates an attack chain, wherein the attack chain includes more than one attack surface to be used, and each attack surface to be used includes more than one available attack plug-in; the available attack plug-ins in the attack chain are loaded; the available attack plug-insin each attack surface to be used are sequentially put into operation according to the priority of each attack surface to be used in the attack chain until a penetration target specified by the useris reached; and the obtained penetration test result is displayed. According to the design, the automatic penetration test can be realized, and the time and labor cost required by the penetration testcan be reduced.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a penetration testing method and device. Background technique [0002] With the development of Internet technology, the application of the network is becoming more and more extensive, and the network security is becoming more and more important. At present, the best way to ensure network security is penetration testing, that is, to let professional network security personnel do security testing and evaluation. [0003] However, in related technologies, the penetration testing process is discontinuous. After completing the test of an attack point, it is necessary to manually verify whether it is successful. If it is successful, it can be verified at a deeper attack level. If it is unsuccessful, it needs to go back and consider other methods. Conducting penetration testing, the process tends to consume a lot of time and can interrupt the train of thought of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 张壮壮
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products