Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detecting unauthorized bug

A vulnerability detection and vulnerability technology, applied in the Internet field, can solve the problems of low efficiency and long time-consuming manual testing, and achieve the effect of improving efficiency, reducing manual processing links and saving time.

Inactive Publication Date: 2018-11-06
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the detection of unauthorized vulnerabilities in the industry is basically manual detection. For example, testers conduct penetration tests on WEB programs. Manual testing takes a long time and is inefficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting unauthorized bug
  • Method and device for detecting unauthorized bug
  • Method and device for detecting unauthorized bug

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0050]It should be understood that the terms "first", "second", and "third" in the description and claims of the present application and the drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the application discloses a method and device for detecting an unauthorized bug. The method comprises the following steps: a terminal sends a first request and a second request to aserver; the first request includes a target URL (Uniform Resource Locator); the second request includes the target URL and a first identification; when the page content of the server, returned aimingto the first request, is not matched with the page content returned aiming to the second request, a third request is sent to the server; the third request includes the target URL and a second identification; and, when the page content of the server, returned aiming to the third request, is not matched with the page content returned aiming to the second request, the unauthorized bug is determined to exist in the target URL. By adoption of the embodiment of the method, the manual processing steps are reduced; the time is saved; and the efficiency for detecting the unauthorized bugs is improved.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to a method and device for detecting an unauthorized vulnerability. Background technique [0002] With the recent outbreak of various high-risk vulnerabilities, network security issues have attracted more and more attention. Privilege violation vulnerability is a common security vulnerability in World Wide Web (WEB) applications. It refers to the negligence of programmers who have not strictly restricted the permissions or users required for an operation, resulting in no operation. Users with permission can operate normally, but the threat is that one account can control all user data of the website or server. For example, an attacker using a legitimate account can perform illegal operations on other account data with unauthorized access, such as regular database commands such as query, delete, and modify. [0003] At present, the detection of unauthorized vulnerabi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0876H04L63/1433H04L67/02H04L67/146
Inventor 熊庆昌
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products