Security diagnostic device and security diagnostic method
A diagnostic device and diagnostic method technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of unclear authority distribution and inability to judge whether there is authority management, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0048] First, the hardware configuration will be described.
[0049] figure 1 It is a block diagram showing an example of the hardware configuration of the safety diagnostic device (hereinafter referred to as diagnostic device) 200 according to the first embodiment.
[0050] Diagnosis device 200 includes: communication interface 101, which performs HTTP communication with a Web application as a diagnosis target; processor 102, which performs calculation processing for HTTP requests and HTTP responses; memory 103, which holds calculation results, etc.; input interface 104, It accepts input from the user; the auxiliary storage device 105 is used to store data; and the output interface 106 is used to display the result on the screen.
[0051] The processor 102 is realized by a processing circuit such as a CPU executing a program stored in a memory, or a system LSI (Large Scale Integration: Large Scale Integration). It is also possible that multiple processing circuits jointly c...
Embodiment approach 2
[0134] In Embodiment 1 above, the extraction unit 303 extracted fixed parameters that do not change every time a login is performed, but in this embodiment, it is shown that the combination of the transfer destination URL and parameters is the same and the extracted value changes every time a login is performed. Parameters and implementations that do not change parameters.
[0135] In addition, in this embodiment, the configuration further added to all the configurations described in Embodiment 1 will be described.
[0136] Figure 16 It is a diagram showing an example of the HTTP request / response table 442 according to the second embodiment.
[0137] Figure 17 It is a diagram showing an example of the parameter table 452 according to the second embodiment.
[0138] First, about Figure 11 The flow chart of FIG. 1 describes operations different from those in the first embodiment.
[0139] exist Figure 11 In step S103, the crawling implementation unit 302 performs crawl...
Embodiment approach 3
[0164] In the first embodiment above, whether the parameters of the HTTP request extracted by the extraction unit 303 are fixed or fluctuate is stored in the fixed parameter table 460 of the fixed parameter database 311, but in this embodiment, the HTTP request to the transfer data database 310 is shown. An implementation that saves the request / response table by adding a field.
[0165] Figure 24 It is an overall block diagram including an example of the functional configuration of the diagnostic device 210 according to the third embodiment. The difference from the diagnostic device 200 of Embodiment 1 is that the unique data database is deleted.
[0166] Figure 25 It is a flowchart showing the processing flow of the input unit 301 , the crawling implementation unit 302 , and the extraction unit 303 in the third embodiment. with Embodiment 1 Figure 11 The difference in the flow chart of is that the transfer data database 310 is output from step S105.
[0167] Figure ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


