Unlock instant, AI-driven research and patent intelligence for your innovation.

Automatic unauthorized penetration test method and storage equipment

A penetration test and test report technology, which is applied in the field of automated unauthorized penetration test methods and storage devices, can solve the problems of heavy repetitive operations, prone to human errors, and low efficiency, so as to avoid human errors, improve test efficiency, and improve The effect of accuracy

Active Publication Date: 2020-11-17
福建国信立联科技集团有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To this end, it is necessary to provide an automated unauthorized penetration testing method to solve the problems of heavy workload, low efficiency, and human error-prone in the existing manual and repetitive operations of unauthorized testing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic unauthorized penetration test method and storage equipment
  • Automatic unauthorized penetration test method and storage equipment
  • Automatic unauthorized penetration test method and storage equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.

[0038] see figure 1 , in this embodiment, the automated unauthorized penetration testing method can be applied to storage devices, which include but are not limited to: personal computers, servers, general-purpose computers, special-purpose computers, network devices, embedded devices, Programming equipment, smart mobile terminals, etc. The storage device needs to be equipped with automated tools. In this embodiment, httprunner is used as an auxiliary test tool. In other embodiments, other test tools can be selected for replacement according to actual conditions, without limitation.

[0039] The core technical idea of ​​this application is: first log in users with different rights to perform all operations on the detection system, ge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of software testing, in particular to an automatic unauthorized penetration test method and storage equipment. The automatic unauthorized penetration test method comprises the steps that a to-be-detected system receives operation requests of users with different authorities, all the operation requests are captured, and an operation request script is generated forall the captured operation requests; the identity identification information value in the operation request script is replaced with a function for obtaining the identity identification information value; and the replaced operation request script is run to simulate a to-be-detected user to log in the to-be-detected system, a response packet corresponding to the request is returned and whether theto-be-detected user is unauthorized successfully or not is judged. In the whole process, the identity identification information of the to-be-detected user can be automatically replaced, the login request and the operation request are carried out on the to-be-detected system according to different identity identification information, the operation access requests of users with various authoritiesare truly and automatically simulated, manual operation one by one is not needed, and the test efficiency is greatly improved.

Description

technical field [0001] The invention relates to the field of software testing, in particular to an automatic unauthorized penetration testing method and a storage device. Background technique [0002] With the continuous development of technology, the progress of software development is getting faster and faster. Therefore, software testing has become particularly important. The so-called software testing refers to the process of operating a software program under specified conditions to find program errors, measure software quality, and evaluate whether it can meet the design requirements. [0003] Privilege Escalation (or privilege escalation, Privilege Escalation), as a common test item in software testing, means that an attacker can perform some operations that he is not qualified to perform, which belongs to the problem of "access control". Its threat lies in the fact that one account can control the user data of the entire site. Of course, these data are limited to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36
CPCG06F11/3672G06F11/3688G06F11/3692
Inventor 张师举
Owner 福建国信立联科技集团有限公司