WEB vulnerability detection method and device based on passive traffic, equipment and medium
A vulnerability detection and flow technology, applied in computer security devices, network data retrieval, other database retrieval, etc., can solve problems such as time-consuming, low efficiency, and prone to omissions
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] This embodiment provides a WEB vulnerability detection method based on passive traffic, which aims to solve the problem of insufficient coverage of existing vulnerability scanning methods by splitting and scanning replaying passive traffic, and can improve the efficiency of WEB vulnerability scanning tests , to assist security testers to discover WEB vulnerabilities in packets faster and more efficiently.
[0059] According to the above principles, the WEB vulnerability detection method based on passive traffic is introduced, such as figure 1 As shown, the WEB vulnerability detection method based on passive traffic specifically includes the following steps:
[0060] Receive the message that needs to be tested;
[0061] Analyzing the message, and storing the parsed message;
[0062] Scan the parsed message, including:
[0063] performing general vulnerability scanning on the parsed message to obtain the first scanning result,
[0064] performing a POC integration sca...
Embodiment 2
[0114] This embodiment discloses a device corresponding to the passive traffic-based WEB vulnerability detection method of Embodiment 1, which is a virtual structure device, such as figure 2 As shown, the WEB vulnerability detection device based on passive traffic includes:
[0115] A message receiving module 210, configured to receive a message that needs to be tested;
[0116] A message parsing module 220, configured to parse the message, and store the parsed message;
[0117] Scanning module 230, configured to scan the parsed message, including:
[0118] performing general vulnerability scanning on the parsed message to obtain the first scanning result,
[0119] performing a POC integration scan on the parsed message to obtain a second scan result,
[0120] performing port scanning on the parsed message to obtain a third scanning result,
[0121] storing the first scan result, the second scan result and the third scan result as vulnerability detection results;
[0122...
Embodiment 3
[0129] image 3 A schematic structural diagram of an electronic device provided by Embodiment 3 of the present invention, such as image 3 As shown, the electronic device includes a processor 310, a memory 320, an input device 330, and an output device 340; the number of processors 310 in a computer device may be one or more, image 3 Take a processor 310 as an example; the processor 310, memory 320, input device 330 and output device 340 in the electronic device can be connected by bus or other methods, image 3 Take connection via bus as an example.
[0130] The memory 320, as a computer-readable storage medium, is used to store software programs, computer executable programs and modules. In this embodiment, the memory 320 is used to store the corresponding The program instructions / modules, that is, the memory 320 stores the message receiving module 210, message parsing module 220, scanning module 230 and result feedback module 240 in the above-mentioned passive traffic-ba...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com