Router automation vulnerability utilization method and system, and electronic device
A router and vulnerability technology, applied in the field of information security, can solve problems such as inefficiency of detection methods
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] According to an embodiment of the present invention, an embodiment of a method for exploiting router automation vulnerabilities is provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0053] figure 1 It is a flow chart of a method for exploiting router automation vulnerabilities according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0054] Step S102, acquiring the router to be detected, and determining the target version information of the router to be detected;
[0055] In the embodiment of the present invention, the method for automatically exploiting router vulnerabilities can be applied to ...
Embodiment 2
[0085] The embodiment of the present invention also provides a system for exploiting router automation vulnerabilities. The system for exploiting router automation vulnerabilities is mainly used to implement the method for exploiting router automation vulnerabilities provided in the above-mentioned content of the embodiments of the present invention. The following describes the methods provided by the embodiments of the present invention A specific introduction to the system of automatic vulnerability exploitation of routers.
[0086] image 3 is a schematic diagram of a system for exploiting router automation vulnerabilities according to an embodiment of the present invention, such as image 3 As shown, the system for automatically exploiting vulnerabilities in routers mainly includes an acquisition module 10, a determination module 20, a vulnerability detection module 30 and a vulnerability utilization module 40, wherein:
[0087] An acquisition module, configured to acquir...
Embodiment 3
[0108] An embodiment of the present invention provides an electronic device, referring to Figure 4 , the electronic device includes: a processor 50, a memory 51, a bus 52 and a communication interface 53, the processor 50, the communication interface 53 and the memory 51 are connected through the bus 52; the processor 50 is used to execute the executable module stored in the memory 51, For example a computer program. The processor implements the steps of the methods described in the method embodiments when the processor executes the program.
[0109] Wherein, the memory 51 may include a high-speed random access memory (RAM, Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 53 (which may be wired or wireless), and the Internet, wide area network, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com