Scene-based penetration test method and device, storage medium and electronic device
A technology of penetration testing and scenarios, applied in the field of network security, can solve problems such as inability to perform targeted detection, inability to customize detection scenarios, long penetration time, etc., and achieve the effect of solving the low efficiency of penetration testing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] The method embodiment provided in Embodiment 1 of the present application may be executed in a computer device or a similar computing device. Taking running on computer equipment as an example, figure 1 It is a hardware structure block diagram of a scenario-based penetration testing computer device according to an embodiment of the present invention. Such as figure 1 As shown, the computer device 10 may include one or more ( figure 1 Only one is shown in the figure) a processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data. Optionally, the above-mentioned computer equipment is also A transmission device 106 for communication functions as well as input and output devices 108 may be included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of th...
Embodiment 2
[0078] In this embodiment, a scenario-based penetration testing device is also provided, and the device is used to implement the above-mentioned embodiments and preferred implementation manners, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0079] Figure 5 is a structural block diagram of a scenario-based penetration testing device according to an embodiment of the present invention, such as Figure 5 As shown, the device includes: a determination module 50, a search module 52, a setting module 54, and an execution module 56, wherein,
[0080] A determining module 50, configured to determine a detection scenario of an infiltration target...
Embodiment 3
[0091] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.
[0092] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
[0093] S1, determining a detection scenario of an infiltration target, wherein the infiltration target is a network system connected through a network;
[0094] S2, searching for a set of vulnerabilities related to the detection scenario in a preset vulnerability library;
[0095] S3, setting penetration means for the set of vulnerabilities, and using the penetration means to combine the penetration strategy;
[0096] S4. Perform a penetration test on the penetration target based on the penetration strategy.
[0097] Optionally, in this embodiment, the above-mentioned storage medium may incl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


