Unlock instant, AI-driven research and patent intelligence for your innovation.

Scene-based penetration test method and device, storage medium and electronic device

A technology of penetration testing and scenarios, applied in the field of network security, can solve problems such as inability to perform targeted detection, inability to customize detection scenarios, long penetration time, etc., and achieve the effect of solving the low efficiency of penetration testing

Inactive Publication Date: 2020-03-13
BEIJING QIANXIN TECH +1
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When performing penetration testing in related technologies, a set of general penetration tools is used for penetration testing, or different penetration methods are used to try, and detection scenarios cannot be customized, nor can targeted detection be performed for scenarios, resulting in low penetration efficiency. long penetration time
[0004] For the above-mentioned problems existing in related technologies, no effective solution has been found yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scene-based penetration test method and device, storage medium and electronic device
  • Scene-based penetration test method and device, storage medium and electronic device
  • Scene-based penetration test method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] The method embodiment provided in Embodiment 1 of the present application may be executed in a computer device or a similar computing device. Taking running on computer equipment as an example, figure 1 It is a hardware structure block diagram of a scenario-based penetration testing computer device according to an embodiment of the present invention. Such as figure 1 As shown, the computer device 10 may include one or more ( figure 1 Only one is shown in the figure) a processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data. Optionally, the above-mentioned computer equipment is also A transmission device 106 for communication functions as well as input and output devices 108 may be included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of th...

Embodiment 2

[0078] In this embodiment, a scenario-based penetration testing device is also provided, and the device is used to implement the above-mentioned embodiments and preferred implementation manners, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0079] Figure 5 is a structural block diagram of a scenario-based penetration testing device according to an embodiment of the present invention, such as Figure 5 As shown, the device includes: a determination module 50, a search module 52, a setting module 54, and an execution module 56, wherein,

[0080] A determining module 50, configured to determine a detection scenario of an infiltration target...

Embodiment 3

[0091] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.

[0092] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:

[0093] S1, determining a detection scenario of an infiltration target, wherein the infiltration target is a network system connected through a network;

[0094] S2, searching for a set of vulnerabilities related to the detection scenario in a preset vulnerability library;

[0095] S3, setting penetration means for the set of vulnerabilities, and using the penetration means to combine the penetration strategy;

[0096] S4. Perform a penetration test on the penetration target based on the penetration strategy.

[0097] Optionally, in this embodiment, the above-mentioned storage medium may incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a scene-based penetration test method and device, a storage medium and an electronic device. The method comprises: determining a detection scene of a penetration target, whereinthe penetration target is a network system connected through a network; searching a vulnerability set related to the detection scene in a preset vulnerability library; setting a penetration means forthe vulnerability set, and combining the penetration strategies by using the penetration means; and performing a penetration test on the penetration target based on the penetration strategy. According to the invention, the technical problem of low penetration test efficiency in related technologies is solved.

Description

technical field [0001] The present invention relates to the field of network security, in particular to a scenario-based penetration testing method and device, storage medium, and electronic device. Background technique [0002] A network attack is an attack on an electronic device by a hacker or a virus Trojan horse, which brings huge losses to users by stealing files, etc., and a penetration test is a process of simulating a network attack to detect problems in advance, make up for them in time, and be prepared. [0003] When performing penetration testing in related technologies, a set of general penetration tools is used for penetration testing, or different penetration methods are used to try, and detection scenarios cannot be customized, nor can targeted detection be performed for scenarios, resulting in low penetration efficiency. Long penetration time. [0004] Aiming at the above-mentioned problems existing in related technologies, no effective solution has been fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/14H04L63/1408H04L63/1433H04L63/1441H04L63/20
Inventor 田跃
Owner BEIJING QIANXIN TECH