Unlock instant, AI-driven research and patent intelligence for your innovation.

Penetration testing method, terminal equipment and storage medium

A penetration testing and terminal technology, applied in the field of network and communication, can solve the problems of low penetration testing efficiency, error-prone, large number of penetration testing terminals, etc., to achieve the effect of improving efficiency, reducing error rate, and avoiding cumbersome operations

Active Publication Date: 2021-12-17
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, a large number of penetration tests mainly rely on the basic skills of penetration testers and the penetration testing tools they can use. Since the industries and scenarios faced by each test are changing dynamically, it is necessary to rely on manual testing by penetration testers during the penetration process. Configure terminal information, but the number of penetration testing terminals is large, resulting in low efficiency and error-prone penetration testing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Penetration testing method, terminal equipment and storage medium
  • Penetration testing method, terminal equipment and storage medium
  • Penetration testing method, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to more clearly understand the above objects, features and advantages of the present disclosure, the solutions of the present disclosure will be further described below. It should be noted that, in the case of no conflict, the embodiments of the present disclosure and the features in the embodiments can be combined with each other.

[0072] In the following description, many specific details are set forth in order to fully understand the present disclosure, but the present disclosure can also be implemented in other ways than described here; obviously, the embodiments in the description are only some of the embodiments of the present disclosure, and Not all examples.

[0073] In the existing technology, penetration testers manually configure terminal addresses and proxy service port information to establish communication connections between terminals. However, penetration testing requires a large number of terminals. Configuring terminal addresses and proxy ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a penetration test method, terminal equipment and a storage medium, is applied to the technical field of network and communication, and solves the problems of complexity and high error rate caused by manual configuration of terminal information. The penetration test method comprises the following steps that a first terminal sends a first access request message to an external network server; if a response message of the first access request message is received within a first preset duration, broadcast addresses of a plurality of networks are acquired; a first connection request message is broadcasted based on the broadcast addresses of the plurality of networks; if a response message of the first connection request message sent by the second terminal is received, it is determined that first communication connection is established with the second terminal, a penetration test instruction is sent to the second terminal through the first communication connection, and the penetration test instruction is used for instructing the second terminal to conduct penetration test.

Description

technical field [0001] The present disclosure relates to the technical field of networks and communications, and in particular to a penetration testing method, terminal equipment and storage media. Background technique [0002] With the development of network and computer software information technology, network security has attracted more and more attention and attention, and related security testing has become more and more necessary. Penetration testing refers to an evaluation method to evaluate the security level of a computer network system by simulating the attack method of a malicious hacker. By completely simulating the hacker's behavior, we can try to intrude on the customer's system, so as to help customers understand the hacker's attack ideas, and then find problems early. [0003] At present, a large number of penetration tests mainly rely on the basic skills of penetration testers and the penetration testing tools they can use. Since the industries and scenario...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/46
CPCH04L63/1416H04L63/1433H04L12/4633
Inventor 米竞张黎元郭勇生
Owner BEIJING TOPSEC NETWORK SECURITY TECH