Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for automatically detecting LDAP authentication injection vulnerabilities

An automatic detection and vulnerability technology, applied in the field of vulnerability detection, can solve problems such as time-consuming, laborious, and omissions, and achieve the effect of improving detection efficiency and reducing detection costs

Active Publication Date: 2019-12-06
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problems existing in the prior art, the present invention innovatively proposes a method and device for automatically detecting LDAP authentication injection loopholes, which effectively solves the time-consuming, laborious, and omission problems caused by manual LDAP authentication injection loophole detection, and effectively improves High detection efficiency and reduced detection cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for automatically detecting LDAP authentication injection vulnerabilities
  • Method and device for automatically detecting LDAP authentication injection vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Such as figure 1 As shown, the present invention provides a method for automatic detection of LDAP authentication injection vulnerabilities, including:

[0034] S1, encapsulating the LDAP Injection Test program as a script;

[0035] S2, communicate and connect the script, LDAP server, and Web application to form a connection relationship between the three;

[0036] S3, obtain the LDAP server configuration information, the first login account, and the second login account through the script, use the first login account to log in to the Web application, and configure LDAP settings in the Web application according to the LDAP server configuration information;

[0037] S4, exit the web application, use the second login account to log in the web application, and judge whether the login is successful, if the judgment result is yes, execute step S5; if the judgment result is no, execute step S1, and reconfigure;

[0038] S5, using the first injection login test case and the ...

Embodiment 2

[0050] Such as figure 2 As shown, the technical solution of the present invention also provides a device for automatically detecting LDAP authentication injection vulnerabilities, including:

[0051] Encapsulation module 101, the LDAP Injection Test program is encapsulated as a script;

[0052] The connection module 102 communicates and connects the script, the LDAP server, and the Web application to form a connection relationship among the three;

[0053] Configuration module 103, obtains LDAP server configuration information, the first login account number, the second login account number by script, uses the first login account number to log in to the Web application, and configures LDAP settings in the Web application according to the LDAP server configuration information;

[0054] Exit the login module 104, exit the Web application, use the second login account to log in the Web application, and determine whether the login is successful;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for automatically detecting LDAP authentication injection vulnerabilities. The method comprises: packaging an LDAP Injection Test program into a script; carrying out communication connection on the script, the LDAP server and the Web application to form a connection relationship of interconnection of the script, the LDAP server and the Web application; logging in the Web application by using the first login account through the script, and performing LDAP setting; exiting the Web application, logging in the Web application by using the second login account, judging whether login succeeds or not, and if login succeeds, performing an injection login test by using the first injection login test case and the second injection login test case; if the login fails, carrying out the configuration again. The invention further provides a device for automatically detecting the LDAP authentication injection vulnerability, an accurate result can be quickly and comprehensively obtained, the detection efficiency is effectively improved, and the detection cost is reduced.

Description

technical field [0001] The invention relates to the field of loophole detection, in particular to a method and device for automatically detecting LDAP authentication injection loopholes. Background technique [0002] With the widespread use of the Internet, the number of Web applications is growing explosively, and the resources and data of these applications are distributed and stored in directories. Usually, different applications have directories dedicated to their own related data, that is, proprietary directories. The increase in the number of proprietary directories has made it increasingly difficult to share and manage systems and resources. Too many directories have brought huge burdens to computer searches. pressure. Using LDAP (Lightweight Directory Access Protocol, Lightweight Directory Access Protocol) to centrally manage information, the search speed is fast, which can effectively relieve the pressure brought by the increase of directories. With the widespread...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L63/1433H04L67/02
Inventor 常磊
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD