A sub-domain name hijacking vulnerability detection method, device and equipment
A detection method and domain name hijacking technology, applied in the field of network security, can solve the problems of labor and time consumption, economy, reputation loss, low efficiency, etc., to avoid missed detection, improve accuracy, and improve detection efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0055] Please refer to figure 1 , figure 1 It is an implementation flowchart of a sub-domain name hijacking vulnerability detection method in an embodiment of the present invention. The method can be applied to computing processing equipment (such as computers, processing chips), and the method includes the following steps:
[0056] S101. Obtain a set of subdomain names for hijacking vulnerabilities to be detected.
[0057] The set of subdomain names can be read from a pre-stored readable storage medium, or the set of subdomain names can be obtained by searching websites and web pages. The set of subdomain names may be subdomain names belonging to the same website, or subdomain names in different websites that need to detect hijacking vulnerabilities.
[0058] Wherein, the acquired sub-domain name set may be a search engine for the target website to obtain the sub-domain name set corresponding to the target website. The target website can be searched by searching engines su...
Embodiment 2
[0095] Corresponding to the above method embodiment, the embodiment of the present invention also provides a sub-domain name hijacking vulnerability detection device, the sub-domain name hijacking vulnerability detection device described below and the sub-domain name hijacking vulnerability detection method described above can refer to each other correspondingly.
[0096] see figure 2 As shown, the device includes the following modules:
[0097] The sub-domain name mining module 101 is used to obtain the set of sub-domain names to be detected for hijacking vulnerabilities;
[0098] The alias vulnerability detection module 102 is used to execute the alias record view command to obtain the alias record corresponding to each subdomain name in the subdomain name set, and use the alias to perform hijacking vulnerability detection to obtain the alias detection vulnerability set;
[0099] Web response vulnerability detection module 103, is used for carrying out web request to each ...
Embodiment 3
[0113] Corresponding to the above method embodiment, the embodiment of the present invention also provides a sub-domain name hijacking vulnerability detection device. The sub-domain name hijacking vulnerability detection device described below and the sub-domain name hijacking vulnerability detection method described above can be referred to in correspondence.
[0114] see image 3 As shown, the subdomain name hijacking vulnerability detection equipment includes:
[0115] memory D1 for storing computer programs;
[0116] The processor D2 is configured to implement the steps of the subdomain name hijacking vulnerability detection method in the above method embodiment when executing the computer program.
[0117] Specifically, please refer to Figure 4 , Figure 4 A specific structural diagram of a sub-domain name hijacking vulnerability detection device provided for this embodiment, the sub-domain name hijacking vulnerability detection device may have relatively large differ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


