Permeation instruction sending method and device, storage medium and electronic device
A technology for sending methods and instructions, which is applied in the field of network security, can solve problems such as undiscovered solutions, and achieve the effect of improving the success rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] The method embodiment provided in Embodiment 1 of the present application can be executed in a server or a similar computing device. Take running on the server as an example, figure 1 It is a block diagram of the hardware structure of the sending server of an infiltration instruction according to the embodiment of the present invention. Such as figure 1 As shown, the server 10 may include one or more (only one is shown in FIG. 1 ) processors 102 (the processors 102 may include but not limited to processing devices such as microprocessors MCUs or programmable logic devices FPGAs) and for A memory 104 for storing data. Optionally, the server may further include a transmission device 106 and an input and output device 108 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above server. For example, server 10 may also include figure 1more ...
Embodiment 2
[0070] In this embodiment, there is also provided a device for sending an infiltration instruction, which may be a server, and the device is used to implement the above embodiments and preferred implementation modes, and those that have been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the means described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0071] Figure 5 is a structural block diagram of a device for sending an infiltration instruction according to an embodiment of the present invention, such as Figure 5 As shown, the device includes: an acquisition module 50, a detection module 52, a conversion module 54, and a sending module 56, wherein,
[0072] Collection module 50, is used for collecting the relevant information...
Embodiment 3
[0084] Embodiments of the present invention also provide a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.
[0085] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
[0086] S1, collecting relevant information of an infiltration target, wherein the infiltration target is a network system connected through a network;
[0087] S2, using the relevant information to detect external vulnerabilities of the infiltration target;
[0088] S3, converting the original penetration instruction into a target penetration instruction in a specified format, wherein the penetration instruction in a specified format is used to access the business system of the network system after bypassing the website application level intrusion prevention system WAF of the network system ;
...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com