Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Phishing hotspot risk demonstration method and device, storage medium and computer equipment

A demonstration method and storage medium technology, which is applied in the field of storage medium, computer equipment, risk demonstration method and device of hot spot fishing, can solve the problems of poor security awareness and achieve the effect of improving network security awareness

Pending Publication Date: 2020-01-14
BEIJING QIANXIN TECH +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, at present, many users have poor awareness of network security. In order to facilitate the Internet, they connect to hotspots at will.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Phishing hotspot risk demonstration method and device, storage medium and computer equipment
  • Phishing hotspot risk demonstration method and device, storage medium and computer equipment
  • Phishing hotspot risk demonstration method and device, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0046] In this embodiment, a risk demonstration method for hotspot phishing is provided, such as figure 1 As shown, the method includes:

[0047] Step 101, create a fishing hotspot according to the configuration information of the fishing hotspot.

[0048] In order to demonstrate the risks of phishing hotspots in this embodiment of the application, it is first necessary to create phishing hotspots so that terminal devices can access the network through phishing hotspots. Specifically, the phishing hotspot configuration information should include the phishing hotspot identification (SSID). The phishing hotspot can choose a highly credible identification name, such as CMCC, ChinaCOM, etc., or an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a phishing hotspot risk demonstration method and device, a storage medium and computer equipment, and the method comprises the steps: building a phishing hotspot according to the configuration information of the phishing hotspot; when the target terminal establishes a connection with the fishing hotspot, obtaining URL information input by the target terminal; sending a phishing page corresponding to the URL information to the target terminal through the phishing hotspot, so as to enable the target terminal to display the phishing page; hijacking flow information of thetarget terminal, and extracting sensitive information corresponding to the phishing page from the flow information; and outputting a risk demonstration report according to the sensitive information. According to the invention, the phishing page is displayed in the target terminal by means of the phishing hotspot to induce a user to provide sensitive information; compared with the mode of purely hijacking the flow information of the user in the prior art, the method has the advantages that the user can more visually feel the leakage condition of the sensitive information through an experientialsafety education mode, and the network safety awareness of the user can be improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a risk demonstration method and device, storage medium, and computer equipment for hotspot phishing. Background technique [0002] In the current electronic information age, wireless hotspots have been widely used. Whether it is a home, work place or a public place, people can easily access the network by connecting to wireless hotspots. Among the large number of wireless hotspots, there are many potential safety hazards. Maliciously deployed phishing hotspots can capture users' personal privacy information, monitor communication traffic, and so on. [0003] However, at present, many users have poor awareness of network security, and for the convenience of surfing the Internet, they connect to hotspots at will. Based on this, how to make people intuitively understand the dangers of phishing hotspots and improve the public's security awareness of wireless hots...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/451G06F16/955H04L29/06
CPCG06F9/451G06F16/9566H04L63/1483H04L63/1466
Inventor 顾为群王翠
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products