Penetration testing method, terminal equipment and storage medium
A penetration testing and terminal technology, applied in the field of network and communication, can solve the problems of low penetration testing efficiency, error-prone, large number of penetration testing terminals, etc., to achieve the effect of improving efficiency, reducing error rate, and avoiding cumbersome operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0071] In order to more clearly understand the above objects, features and advantages of the present disclosure, the solutions of the present disclosure will be further described below. It should be noted that, in the case of no conflict, the embodiments of the present disclosure and the features in the embodiments can be combined with each other.
[0072] In the following description, many specific details are set forth in order to fully understand the present disclosure, but the present disclosure can also be implemented in other ways than described here; obviously, the embodiments in the description are only some of the embodiments of the present disclosure, and Not all examples.
[0073] In the existing technology, penetration testers manually configure terminal addresses and proxy service port information to establish communication connections between terminals. However, penetration testing requires a large number of terminals. Configuring terminal addresses and proxy ser...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


