A method and device for detecting vulnerable files
A vulnerability and file technology, applied in the field of network security, can solve problems such as comprehensive consideration, false positives, and missed negatives, and achieve the effects of improving accuracy and reliability, wide coverage, and improving accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 3
[0064] Example three, if the test environment is under the ASPX environment, claim that if the target test file is an ASPX test file, then use the Base64 decoding function to analyze the target AHP test file;
[0065] Example 4. If the test environment is an AHP environment, and the target test file is called a JSP or JSPX test file, then the Base64 decoding function is used to parse the target JSP or JSPX test file.
[0066] The method and corresponding device for detecting vulnerable files disclosed in this embodiment, by constructing the payload of multi-type files, and constructing complex character strings (such as MD5) that do not exist in the original page and target payload Payload in the detection of parsing and execution operations Compared with related technologies, the accuracy, reliability and precision of vulnerability file detection are improved.
[0067] In an optional embodiment, the vulnerability file detection method disclosed in this embodiment realizes the...
example 1
[0070] Example 1: Perform file inclusion vulnerability detection on the remote end (such as the server side)
[0071] Step 1: Get the target test and determine the target test environment. According to the target test environment PHP test environment, AHP test environment, ASPX test environment, JSPX test environment, etc., set the corresponding target test files, which are PHP test files, AHP test files, ASPX test files, and JSPX test files.
[0072] Step 2: Generate a target load according to the target file and target environment. Specifically, construct the detection payload Payload that includes the test file set according to the test environment in the first step.
[0073] Step 3: Send the target payload to the server, and analyze the target file in the server. The specific parsing rules are according to the preset parsing rules corresponding to the target test files set in each different test environment generated in the first step.
[0074] In the fourth step, the s...
example 2
[0112] Example 2: Execute file inclusion vulnerability detection locally on the terminal:
[0113] Step 1: Get the target test and determine the target test environment. According to the target test environment PHP test environment, AHP test environment, ASPX test environment, JSPX test environment, etc., set the corresponding target test files, which are PHP test files, AHP test files, ASPX test files, and JSPX test files.
[0114] Step 2: Generate a target load according to the target file and target environment. Specifically, construct the detection payload Payload that includes the test file set according to the test environment in the first step.
[0115] Step 3: Upload the target load to the processor of the terminal, and analyze the target file in the processor. The specific parsing rules are according to the preset parsing rules corresponding to the target test files set in each different test environment generated in the first step.
[0116] Step 4: The terminal ju...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


