Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, system and electronic device for exploiting router automation vulnerabilities

A technology of routers and loopholes, applied in the field of information security, can solve problems such as low efficiency of detection methods, and achieve the effects of alleviating low efficiency, improving efficiency, and improving security

Active Publication Date: 2021-09-28
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide a method, system and electronic equipment for automatic exploiting of router vulnerabilities, so as to alleviate the technical problem of inefficiency in the way of manually detecting router vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, system and electronic device for exploiting router automation vulnerabilities
  • A method, system and electronic device for exploiting router automation vulnerabilities
  • A method, system and electronic device for exploiting router automation vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] According to an embodiment of the present invention, an embodiment of a method for exploiting router automation vulnerabilities is provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0053] figure 1 It is a flow chart of a method for exploiting router automation vulnerabilities according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0054] Step S102, acquiring the router to be detected, and determining the target version information of the router to be detected;

[0055] In the embodiment of the present invention, the method for automatically exploiting router vulnerabilities can be applied to ...

Embodiment 2

[0085] The embodiment of the present invention also provides a system for exploiting router automation vulnerabilities. The system for exploiting router automation vulnerabilities is mainly used to implement the method for exploiting router automation vulnerabilities provided in the above-mentioned content of the embodiments of the present invention. The following describes the methods provided by the embodiments of the present invention A specific introduction to the system of automatic vulnerability exploitation of routers.

[0086] image 3 is a schematic diagram of a system for exploiting router automation vulnerabilities according to an embodiment of the present invention, such as image 3 As shown, the system for automatically exploiting vulnerabilities in routers mainly includes an acquisition module 10, a determination module 20, a vulnerability detection module 30 and a vulnerability utilization module 40, wherein:

[0087] An acquisition module, configured to acquir...

Embodiment 3

[0108] An embodiment of the present invention provides an electronic device, referring to Figure 4 , the electronic device includes: a processor 50, a memory 51, a bus 52 and a communication interface 53, the processor 50, the communication interface 53 and the memory 51 are connected through the bus 52; the processor 50 is used to execute the executable module stored in the memory 51, For example a computer program. The processor implements the steps of the methods described in the method embodiments when the processor executes the program.

[0109] Wherein, the memory 51 may include a high-speed random access memory (RAM, Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 53 (which may be wired or wireless), and the Internet, wide area network, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method, system and electronic equipment for automatically exploiting router loopholes, comprising: obtaining a router to be detected, and determining target version information of the router to be detected; determining and target version information in a router vulnerability utilization library according to the target version information The corresponding target vulnerability detection and identification method; the target vulnerability detection and identification method is used to detect the vulnerability of the router to be detected; in the case that the detected router has a vulnerability, the target vulnerability exploit code corresponding to the target vulnerability detection and identification method is used to detect Router conducts exploit attacks. The invention can automatically identify and exploit the vulnerabilities of routers to be detected based on the router vulnerability utilization library, which improves the efficiency of router vulnerability detection, thereby improving the security of IoT devices and alleviating the existing manual detection of router vulnerabilities way inefficient technical problems.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method, system and electronic equipment for exploiting router automation loopholes. Background technique [0002] With the widespread application of the Internet of Things in various fields, various Internet of Things devices have sprung up, and the short development cycle and the weak security awareness of developers have led to a large number of Internet of Things devices with security risks and security vulnerabilities. Compared with the Internet, the consequences caused by the security problems of IoT devices are even worse, ranging from leaking user privacy data to causing property damage or even threatening personal safety. Among the many IoT devices, routers account for a large proportion. As the entrance and dispatch center of a network, routers may cause serious attacks on the entire network if there is a loophole, and there is even a risk of complete para...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 徐凯翼范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD