Post-penetration method of automatic penetration test system based on AI

A penetration testing and automatic technology, applied in neural learning methods, biological neural network models, platform integrity maintenance, etc.

Active Publication Date: 2020-08-04
北京墨云科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention aims to solve the above-mentioned technical problems existing in penetration testing in the prior art when manual services and automated tools are used, and provides a post-penetration method for an automated penetration testing system based on AI, which can effectively improve the stability and performance of penetration testing. efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Post-penetration method of automatic penetration test system based on AI
  • Post-penetration method of automatic penetration test system based on AI
  • Post-penetration method of automatic penetration test system based on AI

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] Such as figure 1 As shown, the present embodiment includes the following steps during use:

[0091] S1. After the post-infiltration module 300 recognizes that the current shell has normal authority, it automatically escalates the authority through exploiting the vulnerability;

[0092] S2, the post-infiltration module 300 automatically extracts the account password data from the memory;

[0093] S3. The post-infiltration module 300 automatically traverses the file system, and the special intelligent module 430 identifies sensitive data files according to the content of the file system, extracts and generates sensitive information;

[0094] S4. The decision-making brain module 420 judges whether an iterative attack is required according to the sensitive information, and returns to the iterative attack judgment if it is judged to be yes, and proceeds to step S5 if it is judged to be otherwise;

[0095] S5. The decision-making brain module 420 judges whether to perform a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a post-penetration method of an automatic penetration test system based on AI. The post-penetration method comprises the following steps: S1, carrying out weight raising; s2, extracting account password data; s3, traversing and generating the sensitive information by a file system; s4, judging whether iterative attacks need to be carried out or not; and S5, judging whethera springboard attack is carried out or not. The post-test method of the automatic penetration test system based on AI provided by the invention can effectively improve the stability and efficiency ofthe penetration test.

Description

technical field [0001] The invention relates to the technical field of network data security, in particular to a post-penetration method of an AI-based automated penetration testing system. Background technique [0002] Penetration test is to completely simulate the attack technology and vulnerability discovery technology that hackers may use, conduct in-depth detection of the security of the target system, discover the most vulnerable link of the system, discover complex, interrelated security problems, and deeper weaknesses , and report the intrusion process and details to the user. The penetration testing workflow is mainly divided into three stages: pre-attack stage, attack stage, and post-attack stage. Pre-attack stage: The purpose is to collect information. Generally, information is obtained by detecting and analyzing targets through tools such as basic network information acquisition and regular vulnerability scanning. Attack phase: The purpose is to attack the tar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F16/951G06N3/04G06N3/08
CPCG06F21/577G06F16/951G06N3/084G06N3/045Y02D30/50
Inventor 谢鑫刘兵周欢李克萌何础成董昊辰
Owner 北京墨云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products