Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability verification method and device, equipment and medium

A verification method and verification method technology, applied in the field of network security, can solve the problems of no repeated vulnerability processing and local vulnerability verification, so as to reduce risks and improve work efficiency

Pending Publication Date: 2021-11-26
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing vulnerability verification methods cannot verify the hidden local vulnerabilities in the target host, and do not deal with repeated vulnerabilities, resulting in repeated verification of vulnerabilities, and there is no detailed processing process for vulnerabilities
Therefore, the frequent occurrence of vulnerabilities has brought great work pressure to discovering vulnerabilities in advance or verifying vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability verification method and device, equipment and medium
  • Vulnerability verification method and device, equipment and medium
  • Vulnerability verification method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0053] Example 1: When the second network data is an XXS (Cross Site Scripting, Cross-Stand Script) Vulnerability, the file contains a type of vulnerability or sensitive file reads the vulnerability, the matching target verification method is a web vulnerability verification method. In this case, the second network data is verified according to the web vulnerability verification method; where the web vulnerability verification method is:

[0054] Re-constructing the URL of the second network data, checks if the second network data after reconstructing the URL contains a preset data information or response state; if included, it is determined that there is a vulnerability in the second network data. Of course, if not included, there is no vulnerability in the second network data.

example 2

[0055] Example 2: When the second network data is the type of SQL injection, the target verification method that matches is the open source penetration test tool SQLMap, which is also vulnerable to the second network data using SQLMAP.

example 3

[0056] Example 3: When the second network data is a Struts Vulnerability or SSL (Secure Sockets Layer Socket Layer) Vulnerability, the second network data is validated by integrating or writing plugins through the Struts Scan tool. Specifically, for the Struts Vulnerability SSL Vulnerability This vulnerability type is unable to use a simple replacement parameter, you can use the Struts SCAN tool to integrate vulnerability verification; or can provide plug-in writing function, perform different vulnerabilities Write a plugin to implement vulnerability verification of the second network data by writing a plugin.

[0057] The vulnerability detecting engine provided in this embodiment includes a variety of verification methods to enhance the type of overlay verification vulnerability to avoid hosted hidden vulnerabilities, reduce the risk of vulnerability.

[0058] Step S110, according to the verification result, determine the vulnerability data of the vulnerability from the second ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a vulnerability verification method and device, equipment and a medium. The method comprises the following steps: acquiring first network data; distributing the first network data to a message queue; consuming the first network data on the message queue, performing deduplication on the first network data according to the MD5 value of each first network data, and distributing second network data obtained after deduplication to the message queue; consuming the second network data from the message queue through a vulnerability detection engine, and performing vulnerability verification on the second network data according to a target verification mode; and determining vulnerability data with vulnerabilities from the second network data according to the verification result, and performing snapshot preservation on the vulnerability data. According to the invention, the working efficiency of vulnerability verification can be improved, and the risk of vulnerability utilization is reduced.

Description

Technical field [0001] The present disclosure relates to the field of network security, and in particular, to a verification method, apparatus, apparatus, and medium of a vulnerability. Background technique [0002] In recent years, with the vigorous development of network technology, the vulnerabilities in the network have become an important factor affecting network security. Whether it is personal or corporate, it faces a severe vulnerability threat. [0003] Currently common vulnerability verification methods can perform remote vulnerability verification and local vulnerabilities for remote vulnerabilities. However, the existing vulnerability verification method cannot verify the local vulnerabilities hidden in the target host, and no repeated vulnerabilities are processed, resulting in repeated verification vulnerabilities, nor does it have a detailed process of vulnerabilities. Therefore, the frequent occurrence of the vulnerability occurs, which brings great work pressure ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 姚善杨圣峰
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products