Vulnerability detection method and system

A vulnerability detection and vulnerability technology, which is applied in the field of network security, can solve the problems of security test strategy loading errors, large influence of human factors, and inability to share security test experience and test strategies, so as to reduce dependence and reduce the influence of human factors Effect

Active Publication Date: 2021-12-31
QIAN JIN NETWORK INFORMATION TECH SHANGHAI LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] First, the influence of human factors is large
Due to factors such as the working status of security engineers, security knowledge reserves, and understanding of test items, it is impossible to ensure that the security testing strategy is well implemented and the full coverage of the business functions to be tested
In addition, different businesses may adopt different development frameworks, such as native PHP mode, self-written mode based on MVC framework, third-party framework mode, etc. Different development frameworks have different testing strategies, so security engineers need to load corresponding test strategy, but in the actual operation process, security engineers may not pay attention to this, resulting in invalid detection of security test strategy loading errors
[0005] Second, the effectiveness of detection tools needs to be improved
At present, the commonly used automated application risk scanners in the security testing process, such as Appscan and NSFOCUS Jiguang, can only cover some simple security risks based on the request-response model, but cannot cover security vulnerabilities such as permissions and security vulnerabilities that require interaction such as stored XSS
[000

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and system
  • Vulnerability detection method and system
  • Vulnerability detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0025] In order to make the objects, technical solutions, and advantages of the present invention more clearly, the technical solutions in the embodiments of the present invention will be described in contemplation in the embodiment of the present invention. It is an embodiment of the invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art are in the range of the present invention without making creative labor premise.

[0026] In the following detailed description, reference may be part of the present application to illustrate various embodiments of the accompanying drawings a specific embodiment of the present disclosure. In the drawings, like reference numerals in different drawings described substantially similar components. Various specific embodiments of the present disclosure has been described in sufficient detail in the following, that of ordinary skill in the art have t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a vulnerability detection method and system, and the method comprises the steps: configuring test parameters based on a test item, at least comprising a to-be-tested target domain name, a test end browser IP address, a proxy server port, a vulnerability and a detection strategy thereof; sending a function point test request data packet to a test target through a proxy server port based on the test end browser, and receiving a returned response data packet; enabling the automatic detection tool to obtain a mirror image data packet of the test request, and carrying out the vulnerability detection on the function points one by one according to the configured vulnerabilities and the corresponding detection strategies; and in response to meeting the ending condition, ending the vulnerability detection. According to the method and the system, the leak detection condition of the function points is avoided, the safety engineers can share the detection experience and strategy, and the dependence on the safety engineers in the detection process is remarkably reduced, so the influence of human factors is reduced.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a loophole detection method and system. Background technique [0002] In the information age, network information security is always the top priority for enterprises and individuals. Whether it is hardware, software or protocol, when there are defects or the system security strategy is insufficient, a loophole will be formed, and the attacker can use the loophole to access or destroy the system without authorization, causing the information system to be attacked by Trojan horses, worms or Control, data leakage, data tampering, deletion, etc., which will bring immeasurable losses to individuals and enterprises, especially some Internet companies, in order to ensure the normal operation of online business and protect the security of user information, usually equipped with security Engineers conduct security inspections on online business vulnerabilities to discover vulner...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/57G06F16/955
CPCG06F21/563G06F21/577G06F16/955
Inventor 马弘煜张炎杨向勇
Owner QIAN JIN NETWORK INFORMATION TECH SHANGHAI LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products