Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability verification system based on sandbox

A technology for verifying systems and vulnerabilities, which is applied in the field of sandbox-based vulnerability verification systems, can solve problems such as making up for unfriendly bugs, secondary attacks on servers, and attacks by hanging horses on visitor pages, so as to achieve friendliness in modifying vulnerabilities and avoid secondary attacks Effect

Inactive Publication Date: 2017-05-31
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is very unfriendly for website creators to make up for bugs in the later stage. Moreover, doing an access verification for a specific attack URL will cause visitors to suffer page hanging attacks and the server to suffer secondary attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability verification system based on sandbox

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] First of all, it should be explained that the present invention relates to sandbox-based vulnerability verification, which is an application of computer technology in the field of Internet technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. The aforementioned software functional modules include but are not limited to: network communication module, vulnerability verification module, etc. All mentioned in the application documents of the present invention belong to this category, and the applicant will not list them one by one.

[0022] Below in conjunction with accompa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to website vulnerability detection and aims at provides a vulnerability verification system based on a sandbox. The vulnerability verification system based on the sandbox comprises a network communication module, a vulnerability verification module, a response storage module and a browser kernel module. The system is used for reproducing a vulnerability of a website. According to the system, an environment when vulnerability verification is carried out can be stored; a self-defined browser can access a page returned after successful attack; the system is friendlier to modification of the vulnerability carried out by a website compiler; and a secondary attack to a server and an attack to a verification client are avoided.

Description

technical field [0001] The invention relates to the field of website vulnerability detection, in particular to a sandbox-based vulnerability verification system. Background technique [0002] The security of the website is an area that people pay more and more attention to after the rapid development of the Internet. Today's website vulnerability scanning only records the constructed Request and the corresponding vulnerability. This is very unfriendly for website creators to make up for bugs in the later stage. Moreover, performing an access verification on a specific attack URL will cause visitors to suffer page hanging attacks and the server to suffer secondary attacks. Contents of the invention [0003] The main purpose of the present invention is to overcome the deficiencies in the prior art, provide a test environment for recording, can use a specific browser to open the requested HTTPResponse, and cut off the request for actively sending packets in the page, so as t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 范渊陈刚黄进
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products