Router automation vulnerability utilization method and system, and electronic device

A router and vulnerability technology, applied in the field of information security, can solve problems such as inefficiency of detection methods

Active Publication Date: 2019-03-01
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide a method, system and electronic equipment for automatic exploitin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Router automation vulnerability utilization method and system, and electronic device
  • Router automation vulnerability utilization method and system, and electronic device
  • Router automation vulnerability utilization method and system, and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] According to an embodiment of the present invention, an embodiment of a method for exploiting router automation vulnerabilities is provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0053] figure 1 It is a flow chart of a method for exploiting router automation vulnerabilities according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0054] Step S102, acquiring the router to be detected, and determining the target version information of the router to be detected;

[0055] In the embodiment of the present invention, the method for automatically exploiting router vulnerabilities can be applied to ...

Embodiment 2

[0085] The embodiment of the present invention also provides a system for exploiting router automation vulnerabilities. The system for exploiting router automation vulnerabilities is mainly used to implement the method for exploiting router automation vulnerabilities provided in the above-mentioned content of the embodiments of the present invention. The following describes the methods provided by the embodiments of the present invention A specific introduction to the system of automatic vulnerability exploitation of routers.

[0086] image 3 is a schematic diagram of a system for exploiting router automation vulnerabilities according to an embodiment of the present invention, such as image 3 As shown, the system for automatically exploiting vulnerabilities in routers mainly includes an acquisition module 10, a determination module 20, a vulnerability detection module 30 and a vulnerability utilization module 40, wherein:

[0087] An acquisition module, configured to acquir...

Embodiment 3

[0108] An embodiment of the present invention provides an electronic device, referring to Figure 4 , the electronic device includes: a processor 50, a memory 51, a bus 52 and a communication interface 53, the processor 50, the communication interface 53 and the memory 51 are connected through the bus 52; the processor 50 is used to execute the executable module stored in the memory 51, For example a computer program. The processor implements the steps of the methods described in the method embodiments when the processor executes the program.

[0109] Wherein, the memory 51 may include a high-speed random access memory (RAM, Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 53 (which may be wired or wireless), and the Internet, wide area network, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a router automation vulnerability utilization method and system and electronic equipment, and the method comprises the steps: obtaining a to-be-detected router, and determiningthe target version information of the to-be-detected router; determining a target vulnerability detection and identification method corresponding to the target version information in a router vulnerability utilization library according to the target version information; carrying out vulnerability detection on the to-be-detected router through a target vulnerability detection and identification method; and under the condition that the to-be-detected router has the vulnerability through detection, performing vulnerability utilization attack on the to-be-detected router through the target vulnerability utilization code corresponding to the target vulnerability detection and identification method. According to the invention, the vulnerability of the to-be-detected router can be automatically identified and utilized based on the router vulnerability utilization library, so that the router vulnerability detection efficiency is improved, the security of the Internet of Things equipment is improved, and the technical problem of low efficiency of an existing manual router vulnerability detection mode is relieved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method, system and electronic equipment for exploiting router automation loopholes. Background technique [0002] With the widespread application of the Internet of Things in various fields, various Internet of Things devices have sprung up, and the short development cycle and the weak security awareness of developers have led to a large number of Internet of Things devices with security risks and security vulnerabilities. Compared with the Internet, the consequences caused by the security problems of IoT devices are even worse, ranging from leaking user privacy data to causing property damage or even threatening personal safety. Among the many IoT devices, routers account for a large proportion. As the entrance and dispatch center of a network, routers may cause serious attacks on the entire network if there is a loophole, and there is even a risk of complete para...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 徐凯翼范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products