Method, device, computer equipment and storage medium for vulnerability detection

A vulnerability detection and vulnerability technology, applied in the field of information security, can solve problems such as the difficulty of comprehensive crawlers, the cookie method is not fully applicable, and the network connection cannot be detected, so as to improve the detection efficiency.

Active Publication Date: 2022-05-17
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For conventional vulnerability scanning systems, web sites are mainly based on crawlers. After login, the page is obtained by simulating login or filling in cookies; the main problems at present are: the current website has an anti-crawling system, and simulating login is getting more and more difficult. The cookie method is not Fully applicable; in addition, the comprehensiveness of crawlers has always been a difficulty. It supports web sites, but it cannot detect the network connection of mobile apps.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, computer equipment and storage medium for vulnerability detection
  • Method, device, computer equipment and storage medium for vulnerability detection
  • Method, device, computer equipment and storage medium for vulnerability detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0048] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the specification of the present application refers to the presence of the features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof.

[0049] The flow of a vulnerability detection met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application relates to the field of information security. The present application discloses a vulnerability detection method, device, computer equipment and storage medium. The method includes: obtaining traffic information sent to the target server, and storing the traffic sent to the target server The information is sent to the detection server; when the detection server receives the traffic information sent to the target server, it analyzes the traffic information sent to the target server to obtain the analysis result; according to the analysis result, it detects whether the target server There is a loophole; when it is detected that the target server has a loophole, the target server is located, and the existing loophole is repaired. The present application obtains traffic information, sends the traffic information to a detection server for analysis, and obtains a vulnerability detection result according to the analysis result, which can effectively detect vulnerabilities in different scenarios and improve detection efficiency.

Description

technical field [0001] The present application relates to the field of information security, in particular to a method, device, computer equipment and storage medium for vulnerability detection. Background technique [0002] Website vulnerabilities, as the B / S mode is widely used, more and more programmers use this mode to write Web applications. However, due to the uneven level and experience of developers, a considerable number of developers did not make the necessary legality judgments on the user's input data or the information carried in the page (such as Cookie) when writing code, resulting in Attackers can use this programming vulnerability to invade databases or attack users of Web applications, thereby obtaining some important data and benefits. [0003] Website vulnerability detection usually refers to a security detection (penetration attack) behavior that detects security vulnerabilities of a specified remote or local computer system based on a vulnerability dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/02
CPCH04L63/1433H04L67/02
Inventor 王延辉张驰
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products