Unlock instant, AI-driven research and patent intelligence for your innovation.

A network protocol-based automated penetration testing method, device and storage medium

A technology of penetration testing and network protocol, which is applied in the field of network security to improve the efficiency of penetration testing, reduce the need to memorize complex console operation commands, and solve the problem of incomplete manual testing.

Active Publication Date: 2022-04-15
ANHUI UNIVERSITY OF TECHNOLOGY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a network protocol-based automated penetration testing method, device, and storage medium. From the perspective of network protocols, the penetration testing can be studied, and only a small amount of information can be provided to complete the target penetration, which solves the problem of traditional command lines. Complicated operation process, improving operator testing efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network protocol-based automated penetration testing method, device and storage medium
  • A network protocol-based automated penetration testing method, device and storage medium
  • A network protocol-based automated penetration testing method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the following will clearly and completely describe the technical solutions of the embodiments of the present invention in conjunction with the drawings of the embodiments of the present invention. Apparently, the described embodiments are some, not all, embodiments of the present invention. Based on the described embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention. Unless otherwise defined, the technical terms or scientific terms used herein shall have the usual meanings understood by those skilled in the art to which the present invention belongs.

[0049] "First", "second" and similar words used in the patent application specification and claims of the present invention do not indicate any order, quantity ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The network protocol-based automated penetration testing method, device and storage medium provided by the present invention relate to the technical field of network security; the method includes fingerprint information collection, fingerprint information preprocessing to set attack paths, test attacks and generate reports, using network protocols as the basis The starting point integrates multiple scripts to quickly identify the basic information of the target server, and then quickly identify risks based on the known information, automatically generate a set of execution, and finally generate a report; Memorizing complex console operation commands solves the problem of incomplete manual testing. One-key integration and automated penetration significantly improve the efficiency of penetration testing.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an automatic penetration test method, device and storage medium based on network protocols. Background technique [0002] With the Internet age, new technologies are constantly emerging. But at the same time Trojan virus is rampant, hacker attacks are frequent, and network threats are becoming more and more serious. Ordinary protective measures are not enough to resist hacker intrusions. Then how to ensure network information security, the answer is to conduct penetration testing. Penetration testing is a method of simulating hacker attacks. Behavior. Before a real hacker attack, the security personnel conduct a penetration test, use hacker techniques and hacker methods to find possible loopholes in the system, and make timely repairs, thereby eliminating hidden dangers and safeguarding network security. Penetration testing currently has problems in both theory and pra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/1433
Inventor 吴宣够王灿余正红赵伟
Owner ANHUI UNIVERSITY OF TECHNOLOGY