Permeation test method and device, storage medium and electronic device
A penetration testing and target technology, applied in the field of network security, can solve problems such as inefficiency, inconvenience, incomplete information, etc., to achieve the effect of improving security and solving inefficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] The method embodiment provided in Embodiment 1 of the present application may be executed in a computer terminal or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal for penetration testing according to the embodiment of the present invention. Such as figure 1 As shown, the computer terminal 10 may include one or more (figure 1 Only one is shown in the figure) a processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data. Optionally, the above-mentioned computer terminal also A transmission device 106 for communication functions as well as input and output devices 108 may be included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and does not limit the structure of the above...
Embodiment 2
[0071] This embodiment also provides a penetration testing device, which is used to implement the above embodiments and preferred implementation modes, and what has been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0072] Image 6 is a structural block diagram of a penetration testing device according to an embodiment of the present invention, such as Image 6 As shown, the device includes: an acquisition module 60, a detection module 62, an acquisition module 64, and an access module 66, wherein,
[0073] A collection module 60, configured to collect relevant information of an infiltration target, wherein the infiltration target is a network system connected thr...
Embodiment 3
[0085]An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.
[0086] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
[0087] S1, collecting relevant information of an infiltration target, wherein the infiltration target is a network system connected through a network;
[0088] S2, using the relevant information to detect external vulnerabilities of the infiltration target;
[0089] S3, using the external vulnerability to obtain a first operation authority of the infiltration target, and using the first operation authority to perform lateral infiltration in the intranet of the infiltration target, and obtain a second operation authority of the infiltration target;
[0090] S4. Use the second operation authorit...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


