Unlock instant, AI-driven research and patent intelligence for your innovation.

Permeation test method and device, terminal equipment and computer readable storage medium

A technology of penetration testing and terminal equipment, applied in software testing/debugging, platform integrity maintenance, other database retrieval, etc., can solve problems such as low testing efficiency

Pending Publication Date: 2021-04-16
深圳融安网络科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a penetration testing method, device, terminal equipment, and computer-readable storage medium, aiming at solving the problem of using the existing testing method in the prior art when performing the penetration testing of the target network system to be tested. less efficient technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permeation test method and device, terminal equipment and computer readable storage medium
  • Permeation test method and device, terminal equipment and computer readable storage medium
  • Permeation test method and device, terminal equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0054] refer to figure 1 , figure 1 It is a schematic structural diagram of a terminal device in the hardware operating environment involved in the solution of the embodiment of the present invention.

[0055] Terminal devices can be mobile phones, smart phones, notebook computers, digital broadcast receivers, personal digital assistants (PDAs), tablet computers (PADs) and other user equipment (User Equipment, UE), handheld devices, vehicle-mounted de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a penetration test method, which is used for terminal equipment, and comprises the following steps: scanning a penetration target in a target network system to obtain target attribute information of the penetration target; searching a target verification utilization script corresponding to the target attribute information in a preset knowledge base; utilizing the target verification utilization script to permeate the permeation target to obtain a permeation result; and obtaining a penetration test result of the penetration target based on the penetration result. The invention further discloses a penetration test device, terminal equipment and a computer readable storage medium. When the penetration test method is used for carrying out penetration test on a penetration target, the test speed is high, and the test efficiency is high.

Description

technical field [0001] The invention relates to the field of industrial information security, in particular to a penetration testing method, device, terminal equipment and computer-readable storage medium. Background technique [0002] In the "Network Security Law of the People's Republic of China", a hierarchical protection system is proposed, and it is clarified that network operating units should perform security protection obligations in accordance with the requirements of the network security hierarchical protection system, and take precautions against computer viruses, network attacks, network intrusions and other behaviors that endanger network security. technical measures to protect the network from interference, destruction or unauthorized access. The promulgation and implementation of a series of laws and industry regulations such as the "Network Security Law of the People's Republic of China", "Level Security 2.0" and "Information Security Protection Guidelines fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36G06F16/903G06F21/57
Inventor 曾宪武
Owner 深圳融安网络科技有限公司