A method and device for automatically detecting ldap authentication injection vulnerabilities
An automatic detection and loophole technology, applied in transmission systems, electrical components, etc., can solve problems such as time-consuming, labor-intensive, and omissions, and achieve the effect of improving detection efficiency and reducing detection costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] like figure 1 As shown, the present invention provides a method of automated detection of LDAP authentication injection vulnerability, including:
[0034] S1, encapsulate the LDAP INJECTION TEST program as a script;
[0035] S2, the script, the LDAP server, web application communicates the connection, constitutes the connection relationship between the three interconnections;
[0036] S3, obtain the LDAP server configuration information through the script, the first login account, the second login account, use the first login account to log in to the web application, configure the LDAP settings in the web application according to the LDAP server configuration information;
[0037] S4, exit the web application, use the second login account to log in to the web application, determine whether the login is successful, if the result is that the result is yes, then step S5 is performed; if the result of the determination is not, step S1 is executed;
[0038] S5, use the first inj...
Embodiment 2
[0050] like figure 2 As shown, the technical solution of the present invention also provides an automated detection of an LDAP authentication injection vulnerability, including:
[0051] The package module 101 encapsulates the LDAP INJECTION TEST program as a script;
[0052] Connection module 102, communicate scripts, LDAP servers, web applications, constitutes three interconnected connection relationships;
[0053] Configuration module 103, obtain LDAP server configuration information, first login account, second login account, using the first login account, configure the LDAP setting in the web application according to the LDAP server configuration information using the first login account.
[0054] Exit the login module 104, exit the web application, log in to the web application using the second login account, and determine whether the login is successful;
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

