Automatic unauthorized penetration test method and storage equipment
A penetration test and test report technology, which is applied in the field of automated unauthorized penetration test methods and storage devices, can solve the problems of heavy repetitive operations, prone to human errors, and low efficiency, so as to avoid human errors, improve test efficiency, and improve The effect of accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.
[0038] see figure 1 , in this embodiment, the automated unauthorized penetration testing method can be applied to storage devices, which include but are not limited to: personal computers, servers, general-purpose computers, special-purpose computers, network devices, embedded devices, Programming equipment, smart mobile terminals, etc. The storage device needs to be equipped with automated tools. In this embodiment, httprunner is used as an auxiliary test tool. In other embodiments, other test tools can be selected for replacement according to actual conditions, without limitation.
[0039] The core technical idea of this application is: first log in users with different rights to perform all operations on the detection system, ge...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


