Weblogic deserialization vulnerability scanning detection method and tool

A vulnerability scanning and vulnerability detection technology, applied in the field of network information security, can solve problems affecting the efficiency of server vulnerability scanning and detection, troubles, etc., and achieve the effect of increasing the efficiency of vulnerability detection

Inactive Publication Date: 2022-07-29
厦门农芯数字科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The vulnerability scanning detection methods and tools in the prior art do not combine the deserialization processing method to process the vulnerability scanning results. In the next vulnerability scanning, it is necessary to manually input initialization instructions to initialize the vulnerability detection results. This method is relatively Trouble, affecting the detection efficiency of other subsequent server vulnerability scans

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weblogic deserialization vulnerability scanning detection method and tool
  • Weblogic deserialization vulnerability scanning detection method and tool
  • Weblogic deserialization vulnerability scanning detection method and tool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] A Weblogic deserialization vulnerability scanning detection method and tool, comprising a vulnerability detection tool ontology 1, a vulnerability scanning host 10, a vulnerability detection module 15 and a deserialization processing module 19, the vulnerability detection tool ontology 1 is provided with a vulnerability scanning host 10, The vulnerability scanning host 10, the input end of the vulnerability scanning host 10 and the input end of the vulnerability detection server 14 are connected to each other, the vulnerability scanning host 10 is provided with a vulnerability detection module 15, the output end of the vulnerability detection module 15 and the input end of the vulnerability verification module 16 Connected to each other, the output end of the vulnerability verification module 16 and the input end of the data transmission module 17 are connected to each other, the output end of the data transmission module 17 and the input end of the vulnerability detectio...

Embodiment 2

[0057] A Weblogic deserialization vulnerability scanning detection method includes the following steps:

[0058] Step 1: Connect multiple Weblogic servers to the vulnerability detection tool ontology 1;

[0059] Step 2: The vulnerability scanning interface 18 is initialized by the deserialization processing module 19, so that the detection interface, domain name address, detection result, and user instruction are restored to the initial operating state at the same time;

[0060] Step 3: Perform vulnerability scanning on the host, port and database of the Weblogic server respectively through the host scanning detection module 26, port scanning detection module 27, and database scanning detection module 28 to which the vulnerability detection module 15 belongs, and pass the OS scanning and identification module 29 Protocol identification for Weblogic server;

[0061] Step 4: After the vulnerability scanning and detection of the Weblogic server, the vulnerability verification mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Weblogic deserialization vulnerability scanning detection method and tool, the tool comprises a vulnerability detection tool body, a vulnerability scanning host, a vulnerability detection module and a deserialization processing module, the vulnerability detection tool body is internally provided with the vulnerability scanning host, the vulnerability scanning host is connected with the deserialization processing module, and the deserialization processing module is connected with the vulnerability detection module. The input end of the vulnerability scanning host is connected with the input end of the vulnerability detection server, and the deserialization processing module is adopted to initialize the vulnerability scanning interface, so that the detection interface, the domain name address, the detection result and the user instruction are recovered to the initial running state at the same time; by adopting the mode, the detection interface, the domain name address, the detection result and the user instruction can be in the initial state before each vulnerability scanning, so that the vulnerability scanning detection tool does not need to be initialized by manually inputting the instruction, and the subsequent vulnerability detection efficiency of other Weblogic servers is effectively improved.

Description

technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to a Weblogic deserialization vulnerability scanning detection method and tool. Background technique [0002] Vulnerability scanning refers to a security detection (penetration attack) behavior that detects the security vulnerability of a specified remote or local computer system by scanning and other means based on a vulnerability database, and finds exploitable vulnerabilities. Vulnerability scanning technology is an important network security technology. It cooperates with firewalls and intrusion detection systems to effectively improve network security. By scanning the network, network administrators can understand network security settings and running application services, discover security vulnerabilities in time, and objectively assess network risk levels. WebLogic is an application server produced by Oracle Corporation of the United States,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/02
CPCH04L63/1433H04L67/02
Inventor 薛素金郑建民
Owner 厦门农芯数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products