Ultra vires vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in the computer field, to achieve the effect of increasing the scope and coverage and ensuring security

Active Publication Date: 2019-03-08
BEIJING KNOWNSEC INFORMATION TECH
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the above-mentioned deficiencies in the prior art, the purpose of this application is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ultra vires vulnerability detection method and device
  • Ultra vires vulnerability detection method and device
  • Ultra vires vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, rather than all of them. The components of the embodiments of the present application generally described and shown in the drawings herein may be arranged and designed in various different configurations.

[0041] Therefore, the following detailed description of the embodiments of the present application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the present application. Based on the embodiments in this application, all other embodiments obtained by a person of ordinary skill in the art without creative work shall fall within the protection scope of this application.

[0042]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the application provides an ultra vires vulnerability detection method and device. By restoring URLs based on Web access logs, the method increases the range and coverage of URL detection, further obtains the first response information received by accessing respective URLs and second response information received by accessing a random URL associated with the URL, and according tothe first response information and the second response information, whether the website corresponding to the URL exists ultra vires vulnerability is detected, the detection result is obtained, and the ultra vires access vulnerability can be excavated efficiently without manual detection and participation, so as to ensure the safety of the website.

Description

Technical field [0001] This application relates to the field of computer technology, and specifically, to a method and device for detecting an unauthorized vulnerability. Background technique [0002] At present, when performing vulnerability detection, traditional vulnerability scanners crawl all the link addresses on a certain page of the website, then visit these link addresses, and determine whether there are vulnerabilities based on the response content. However, it is difficult to distinguish the front-end and back-end of the WEB application in the above solution, and the URL range involved is narrow, which makes it difficult to detect many unauthorized vulnerabilities. Therefore, manual detection methods are generally used for unauthorized vulnerabilities, but manual detection methods require professional infiltrators to audit WEB application codes and test application interfaces, which leads to cumbersome testing procedures, low efficiency, and greatly increases labor cos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/55G06F16/955
CPCG06F21/552G06F21/577G06F2221/034
Inventor 罗智高
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products