Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permeation instruction sending method and device, storage medium and electronic device

A technology for sending methods and instructions, which is applied in the field of network security, can solve problems such as undiscovered solutions, and achieve the effect of improving the success rate

Inactive Publication Date: 2020-02-07
BEIJING QIANXIN TECH +1
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the above-mentioned problems existing in related technologies, no effective solution has been found yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permeation instruction sending method and device, storage medium and electronic device
  • Permeation instruction sending method and device, storage medium and electronic device
  • Permeation instruction sending method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The method embodiment provided in Embodiment 1 of the present application can be executed in a server or a similar computing device. Take running on the server as an example, figure 1 It is a block diagram of the hardware structure of the sending server of an infiltration instruction according to the embodiment of the present invention. Such as figure 1 As shown, the server 10 may include one or more (only one is shown in FIG. 1 ) processors 102 (the processors 102 may include but not limited to processing devices such as microprocessors MCUs or programmable logic devices FPGAs) and for A memory 104 for storing data. Optionally, the server may further include a transmission device 106 and an input and output device 108 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above server. For example, server 10 may also include figure 1more ...

Embodiment 2

[0070] In this embodiment, there is also provided a device for sending an infiltration instruction, which may be a server, and the device is used to implement the above embodiments and preferred implementation modes, and those that have been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the means described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0071] Figure 5 is a structural block diagram of a device for sending an infiltration instruction according to an embodiment of the present invention, such as Figure 5 As shown, the device includes: an acquisition module 50, a detection module 52, a conversion module 54, and a sending module 56, wherein,

[0072] Collection module 50, is used for collecting the relevant information...

Embodiment 3

[0084] Embodiments of the present invention also provide a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.

[0085] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:

[0086] S1, collecting relevant information of an infiltration target, wherein the infiltration target is a network system connected through a network;

[0087] S2, using the relevant information to detect external vulnerabilities of the infiltration target;

[0088] S3, converting the original penetration instruction into a target penetration instruction in a specified format, wherein the penetration instruction in a specified format is used to access the business system of the network system after bypassing the website application level intrusion prevention system WAF of the network system ;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a penetration instruction sending method and device, a storage medium and an electronic device, and the method comprises the steps: collecting the related information of a penetration target which is a network system connected through a network; detecting an external vulnerability of the permeation target by using the related information; converting the original penetrationinstruction into a target penetration instruction in a specified format, the penetration instruction in the specified format being used for accessing a service system of the network system after bypassing a website application level intrusion prevention system WAF of the network system; and sending the target penetration instruction to a server of the network system through the external vulnerability. According to the invention, the technical problem of low penetration efficiency caused by WAF protection equipment in related technologies is solved, and the success rate of penetration test is improved.

Description

technical field [0001] The present invention relates to the field of network security, in particular, to a method and device for sending penetration instructions, a storage medium, and an electronic device. Background technique [0002] A network attack is an attack on an electronic device by a hacker or a virus Trojan horse, which causes huge losses to users by stealing files, etc., and a penetration test is a process of simulating a network attack, so as to detect problems in advance, make up for them in time, and be prepared. [0003] Related technologies generally send a large number of penetration commands to the target system when performing penetration testing. If there is one that can escape the detection of the defense system, the penetration test can be performed. The applicant found that many network nodes have deployed WAF protection equipment , if the original penetration command is sent directly, it is likely to be discovered by the WAF protection device and di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/145
Inventor 田跃
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products