WEB vulnerability detection method and device based on passive traffic, equipment and medium

A vulnerability detection and flow technology, applied in computer security devices, network data retrieval, other database retrieval, etc., can solve problems such as time-consuming, low efficiency, and prone to omissions

Pending Publication Date: 2020-10-30
GUANGTONGTIANXIA NETWORK TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For active scanning, the method of collecting target WEB assets is path scanning and crawler, which is difficult to cover all test points, and there is a certain degree of limitation. For new vulnerabilities, it is necessary to find new vulnerability points for testing,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WEB vulnerability detection method and device based on passive traffic, equipment and medium
  • WEB vulnerability detection method and device based on passive traffic, equipment and medium
  • WEB vulnerability detection method and device based on passive traffic, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] This embodiment provides a WEB vulnerability detection method based on passive traffic, which aims to solve the problem of insufficient coverage of existing vulnerability scanning methods by splitting and scanning replaying passive traffic, and can improve the efficiency of WEB vulnerability scanning tests , to assist security testers to discover WEB vulnerabilities in packets faster and more efficiently.

[0059] According to the above principles, the WEB vulnerability detection method based on passive traffic is introduced, such as figure 1 As shown, the WEB vulnerability detection method based on passive traffic specifically includes the following steps:

[0060] Receive the message that needs to be tested;

[0061] Analyzing the message, and storing the parsed message;

[0062] Scan the parsed message, including:

[0063] performing general vulnerability scanning on the parsed message to obtain the first scanning result,

[0064] performing a POC integration sca...

Embodiment 2

[0114] This embodiment discloses a device corresponding to the passive traffic-based WEB vulnerability detection method of Embodiment 1, which is a virtual structure device, such as figure 2 As shown, the WEB vulnerability detection device based on passive traffic includes:

[0115] A message receiving module 210, configured to receive a message that needs to be tested;

[0116] A message parsing module 220, configured to parse the message, and store the parsed message;

[0117] Scanning module 230, configured to scan the parsed message, including:

[0118] performing general vulnerability scanning on the parsed message to obtain the first scanning result,

[0119] performing a POC integration scan on the parsed message to obtain a second scan result,

[0120] performing port scanning on the parsed message to obtain a third scanning result,

[0121] storing the first scan result, the second scan result and the third scan result as vulnerability detection results;

[0122...

Embodiment 3

[0129] image 3 A schematic structural diagram of an electronic device provided by Embodiment 3 of the present invention, such as image 3 As shown, the electronic device includes a processor 310, a memory 320, an input device 330, and an output device 340; the number of processors 310 in a computer device may be one or more, image 3 Take a processor 310 as an example; the processor 310, memory 320, input device 330 and output device 340 in the electronic device can be connected by bus or other methods, image 3 Take connection via bus as an example.

[0130] The memory 320, as a computer-readable storage medium, is used to store software programs, computer executable programs and modules. In this embodiment, the memory 320 is used to store the corresponding The program instructions / modules, that is, the memory 320 stores the message receiving module 210, message parsing module 220, scanning module 230 and result feedback module 240 in the above-mentioned passive traffic-ba...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a WEB vulnerability detection method based on passive traffic, relates to the technical field of vulnerability detection, and aims to improve the scanning test efficiency of WEB vulnerability. The method comprises the following steps: receiving a message to be tested; analyzing the message, and storing the analyzed message; scanning the parsed message, including performinggeneral vulnerability scanning, POC integrated scanning and port scanning on the parsed message to obtain a vulnerability detection result, and storing the vulnerability detection result; and returning the vulnerability detection result. The invention further discloses a WEB vulnerability detection device based on the passive traffic, electronic equipment and a computer storage medium.

Description

technical field [0001] The invention relates to the technical field of vulnerability detection, in particular to a method, device, equipment and medium for WEB vulnerability detection based on passive flow. Background technique [0002] At present, for vulnerability testing, from the earlier purely manual testing to the emergence of common active vulnerability scanning tools, the vulnerability discovery process is gradually becoming more active. When security personnel conduct WEB penetration detection and vulnerability mining, the method usually used is manual testing, assisted by active scanning tools. For active scanning, the method of collecting target WEB assets is path scanning and crawlers, which is difficult to cover all test points and has a certain degree of limitation. For new vulnerabilities, it is necessary to find new vulnerability points for testing, which is inefficient. Although the coverage of manual testing is wider than that of active scanning, when the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F16/951G06F21/57
CPCH04L63/1433H04L63/1441H04L67/02H04L63/1416G06F21/577G06F16/951
Inventor 徐文强赵俊单夏烨任新新段吉瑞
Owner GUANGTONGTIANXIA NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products