Penetration testing method, equipment and storage medium

A technology of penetration testing and functional modules, applied in the field of information security, can solve the problem of time-consuming and laborious penetration testing

Active Publication Date: 2022-05-17
XIAN SECLOVER INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present disclosure provide a penetration testing method, equipment, and storage medium, which can solve the time-consuming and laborious problem of existing penetration testing, realize automation of penetration testing, and improve the quality of penetration testing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Penetration testing method, equipment and storage medium
  • Penetration testing method, equipment and storage medium
  • Penetration testing method, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0047] Embodiments of the present disclosure provide a penetration testing method, such as figure 1 As shown, the penetration testing method includes the following steps:

[0048] 101. Acquire address information of a target system and feature information of the target system.

[0049] In the embodiment of the present disclosure, the address information of the target system includes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosure provides a penetration testing method, equipment, and storage medium, which relate to the field of information security technology, can solve the time-consuming and laborious problem of the existing penetration testing, realize the automation of the penetration testing, and improve the quality of the penetration testing. The specific technical solution is: obtain the address information of the target system and the feature information of the target system; select the corresponding function module from the function module library according to the feature information of the target system, and the function module library includes a plurality of different function modules; The functional modules form the target attack chain of the target system according to the preset rules; according to the address information of the target system and the target attack chain, the penetration test is performed on the target system. The present invention is used for penetration testing.

Description

technical field [0001] The present disclosure relates to the technical field of information security, in particular to a penetration testing method, device and storage medium. Background technique [0002] Penetration testing is an assessment method for evaluating computer network security by simulating the attack methods of malicious hackers. The process includes the active analysis of any weaknesses, technical flaws or vulnerabilities of the system. This analysis is from the location where an attacker may exist. Conducted, and conditionally active exploitation of security vulnerabilities from this location. In other words, penetration testing means that infiltrators use various means to test a specific network in different locations (such as from the internal network, from the external network, etc.), in order to discover and dig out the loopholes in the system, and then output Penetration testing report and submission to network owner. Based on the penetration test repo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57H04L9/40
CPCH04L63/1433G06F21/577
Inventor 李鹏轩刘浩杰陈恒如陈国豪
Owner XIAN SECLOVER INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products