Iterative attack method of automatic penetration test system based on AI
A penetration testing and iterative technique, applied in the field of iterative attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0095] Such as figure 1 As shown, the present embodiment includes the following steps during use:
[0096] S1. Penetration test task setting: including setting the penetration target, parameters, whether to automatically springboard the attack, and start the task;
[0097] S2. Attack surface, intelligence data, and vulnerability information collection: the decision-making brain module 420 generates a driving instruction according to the target IP or domain name set by the penetration testing task and sends it to the information collection module 100, and the information collection module 100 collects the attack surface and intelligence according to the driving instruction Data, vulnerability information and vulnerability information are sent to the decision-making brain module 420; figure 2 As shown, step S2 further includes the following steps:
[0098] S21. The decision-making brain module 420 judges the type of the penetration testing task, and enters step S22 when the s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com