Detection method and system for SQL injection loophole
A vulnerability detection and injection attack technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as inaccurate methods, false positives, and inability to make normal judgments, so as to improve efficiency and accuracy, and avoid inaccuracy Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] This embodiment is a specific real-time mode of the SQL injection vulnerability detection method, the main operation process is as follows figure 1 shown. The basic idea of this embodiment is: it provides a series of SQL injection attack templates, wherein each template is composed of several SQL injection statements that may cause the server to return different results, and a cross-validation function corresponding to the template. For each webpage to be scanned on the server, the SQL injection vulnerability detection system will send a normal SQL access request and a specific SQL injection statement to the webpage according to the selected template, and receive the returned result from the server. Since each access request is constructed in advance, if these access requests can be executed on the server, different return results will be returned. The cross-validation function judges whether the submitted SQL injection statement has been executed on the server by co...
Embodiment 2
[0061] This embodiment is a system for implementing the method described in the embodiment, and the system structure diagram is shown in figure 1 shown. That is, a SQL injection vulnerability detection system, the system is installed on the user terminal of the Internet, and has at least one webpage definition unit to be verified connected with the network server. There is at least one SQL injection attack template selection unit that is connected with the web page definition unit to be verified and can provide four attack template subunits. There is at least one cross-validation unit that gets support from the SQL injection attack template selection unit and interfaces with the web server. The system includes:
[0062] 1. Webpage definition unit to be verified: define a series of webpage addresses that may contain SQL injection vulnerabilities.
[0063] 2. SQL injection attack template selection unit: lists available SQL injection attack templates for users to choose.
[...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com