CN103227992A - Android terminal-based vulnerability scanning system - Google Patents

Android terminal-based vulnerability scanning system Download PDF

Info

Publication number
CN103227992A
CN103227992A CN2013101103509A CN201310110350A CN103227992A CN 103227992 A CN103227992 A CN 103227992A CN 2013101103509 A CN2013101103509 A CN 2013101103509A CN 201310110350 A CN201310110350 A CN 201310110350A CN 103227992 A CN103227992 A CN 103227992A
Authority
CN
China
Prior art keywords
scanning
android terminal
vulnerability
user
scanning system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101103509A
Other languages
Chinese (zh)
Inventor
李千目
高双双
侯君
戚湧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Science and Technology Changshu Research Institute Co Ltd
Original Assignee
Nanjing University of Science and Technology Changshu Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Science and Technology Changshu Research Institute Co Ltd filed Critical Nanjing University of Science and Technology Changshu Research Institute Co Ltd
Priority to CN2013101103509A priority Critical patent/CN103227992A/en
Publication of CN103227992A publication Critical patent/CN103227992A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention relates to an Android terminal-based vulnerability scanning system which comprises an Android terminal, a weak password detection module and a scanning control platform, wherein the Android terminal is connected with the scanning control platform through the weak password detection module. According to the Android terminal-based vulnerability scanning system, the Android terminal can be scanned comprehensively, through port scanning, a user can check opened ports, and through vulnerability scanning, vulnerabilities of the terminal can be scanned out, and patches can be downloaded to repair the vulnerabilities; and hardware information of the terminal is stored in an encrypted file, and the user can view the file through decryption, so that the file cannot be stolen, and safety is improved. The Android terminal-based vulnerability scanning system can improve safety of Android terminal equipment, and decreases vulnerabilities of the terminal equipment.

Description

Vulnerability scanning system based on the Android terminal
Technical field
The present invention relates to network communications technology field, be specifically related to a kind of vulnerability scanning system based on the Android terminal.
Background technology
According to incompletely statistics, on Internet, have and surpass server and the client that 95% hacker can attack those mis-arranges.These server and client sides often exist a lot of security breaches, and the hacker of most of the Internets just seeks the security breaches that exist by some simple scanning imaging systems in fact.By stamping corresponding security patch or revising corresponding configuration, just can stop most attack.
The cyberspace vulnerability scanning system is exactly to come from the instrument that the hacker adopts when the invasion network system.The cyberspace vulnerability scanning system is comprehensively tested system, and test result is analyzed according to known security breaches set, and the leak to system provides the repairing suggestion at last.The cyberspace vulnerability scanning system can help the network manager to find the security breaches that may exist early before the assailant attacks, and got rid of potential safety hazard, prevented trouble before it happens.
Nowadays, the Android system is very universal, the Android mobile phone is seen everywhere especially, along with gradually becoming strong of cell-phone function, mobile phone has been not only a communication equipment, and people also surf the Net through mobile phone commonly used, some hackers just may invade people's mobile phone by network, obtain personal information and number of the account etc., so, our attention also should be caused for the safety problem of mobile phone.At present, have the strategy of multiple solution based on Android terminal security problem, wherein vulnerability scanning system can be found the leak that system is potential, prevents trouble before it happens, and becomes one of important technology of terminal security.
Android software itself exists as leaks such as internal memory leakages, and the user needs in time to repair leak to improve the fail safe of terminal; Secondly Android system development so far, leak is attacked also to be existed often, the patch of Google issue needs download timely to repair terminal, makes its maintenance safety and stability.
Summary of the invention
The objective of the invention is to propose, can find system vulnerability potential in the Android terminal equipment, improve the fail safe of Android terminal equipment, reduce the leak that terminal equipment exists by native system at having the problem of leak in the Android terminal equipment.
Technical scheme of the present invention is:
A kind of vulnerability scanning system based on the Android terminal comprises Android terminal, weak tendency password detection module and scan control platform, and described Android terminal use links to each other by weak tendency password detection module with the scan control platform.
Further, the scan control platform comprises vulnerability scanning, application information scanning, TCP and end message scanning, and described vulnerability scanning links to each other with vulnerability database, and vulnerability database carries out the vulnerability database down loading updating by downloading leak information from server; Described application information scanning links to each other with vulnerability database, is used for checking of set up applications information; Described TCP comprises tcp port scanning and udp port scanning; Described end message scanning provides by the file of encrypting.
Beneficial effect of the present invention is: 1) can in time pass through the server update vulnerability database, scan existing leak of Android terminal and download patches, thereby help reducing the attack that comes from network; 2) can check port information by TCP, be convenient to the user and the later stage respective handling is done in the corresponding port.
Description of drawings
Fig. 1 is the theory diagram of native system.
Embodiment
The present invention is further illustrated below in conjunction with drawings and Examples.
A kind of vulnerability scanning system based on the Android terminal comprises Android terminal, weak tendency password detection module and scan control platform, and described Android terminal use links to each other by weak tendency password detection module with the scan control platform.
At first, the Android terminal use will be at first carry out password to the user and detect before entering the scan control platform, if the key of user's input correctly then judge that the user has authority to enter vulnerability scanning system, can enter the scan control platform.
Further, the scan control platform comprises vulnerability scanning, application information scanning, TCP and end message scanning, described vulnerability scanning links to each other with vulnerability database, vulnerability database is by downloading leak information from server, carry out the vulnerability database down loading updating, mate with the Android terminal then; Described application information scanning links to each other with vulnerability database, is used for checking of set up applications information; Described TCP comprises tcp port scanning and udp port scanning; Described end message scanning provides by the file of encrypting.
Further, the Socket based on Transmission Control Protocol is used in tcp port scanning, and the Datagram Socket based on udp protocol is used in udp port scanning.When the Socket that uses based on Transmission Control Protocol, create Socket, subsequently connect is carried out in the corresponding port, at last Socket is closed; DatagramSocke when using based on udp protocol at first creates DatagramPacket, creates corresponding DatagramChannel subsequently, and connect creates DatagramSocket then, and sends data, judges according to sending the result whether port is opened.The user can freely select TCP or udp port scanning.Whether after TCP, the user can check terminal prot information, knows that thus which port is open, select port to open according to the Android terminal for safe requirement then, can close the port that there is risk in some.
In addition, when carrying out vulnerability scanning, at first need to download already present leak information from server, carry out the vulnerability database down loading updating,, multiple attributes such as the dbase of comprising and version number arranged with the AppInfo(customization type) form is stored among the ArrayList, the ArrayList of the dbase of retrieving out with the Android terminal compares then, if there is leak in the Android terminal, then can offer the patch download address of user's relevant vulnerability, the user can select to download voluntarily.
When the user checked application information, the user can see all application programs that the Android terminal is installed.Obtain a series of information such as the title of corresponding software and version number by creating the PackageInfo example, show in the tabulation mode at last, software for display name and version number, the system that being convenient to vulnerability scanning and leak influences is complementary.
When the user checked terminal hardware information, terminal hardware information provided by file, and this file is encrypted, DES provided herein, DESed, three kinds of cryptographic algorithm of AES.With DES is example, according to the encryption key of input, creates the Cipher example, by init () function and doFinal () function character string is encrypted then.
The course of work of native system is: the user who holds the Android terminal equipment at first needs to input password, and this password just can not be changed once input, and after this land this system all needs to input this password at every turn, and this password can not be too simple; After the user enters system, the user according to own needs select that leak is checked, application information is checked, terminal hardware information inspection or port information check.
The present invention can in time pass through the server update vulnerability database, scans the existing leak of Android terminal and downloads the leak patch according to the patch download address, thereby help reducing the attack that comes from network; Can check port information by TCP, be convenient to the user and the later stage respective handling is done in the corresponding port.

Claims (6)

1. vulnerability scanning system based on the Android terminal is characterized in that: comprise Android terminal, weak tendency password detection module and scan control platform, described scan control platform links to each other with the Android terminal use by weak tendency password detection module.
2. the vulnerability scanning system based on the Android terminal according to claim 1, it is characterized in that: comprise that also weak tendency password detection module carries out the step that password detects to the user, when the user imports correct key, then system judges that the user has authority to enter the scan control platform; Otherwise the user cannot enter the scan control platform.
3. the vulnerability scanning system based on the Android terminal according to claim 1, it is characterized in that: described weak tendency password detection module comprises vulnerability scanning, application information scanning, TCP and four functional modules of end message scanning, described vulnerability scanning links to each other with vulnerability database, vulnerability database carries out the vulnerability database down loading updating by downloading leak information from server; Described application information scanning links to each other with vulnerability database, is used for checking of set up applications information; Described TCP comprises tcp port scanning and udp port scanning; Described end message scanning provides by the file of encrypting.
4. the vulnerability scanning system based on the Android terminal according to claim 3 is characterized in that: the described information of set up applications comprises the name and the version number of application program.
5. the vulnerability scanning system based on the Android terminal according to claim 3 is characterized in that: the Socket based on Transmission Control Protocol is used in described tcp port scanning, and the Datagram Socket based on udp protocol is used in udp port scanning.
6. the vulnerability scanning system based on the Android terminal according to claim 3 is characterized in that: described end message scanning is used for the display terminal hardware information.
CN2013101103509A 2013-04-01 2013-04-01 Android terminal-based vulnerability scanning system Pending CN103227992A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101103509A CN103227992A (en) 2013-04-01 2013-04-01 Android terminal-based vulnerability scanning system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013101103509A CN103227992A (en) 2013-04-01 2013-04-01 Android terminal-based vulnerability scanning system

Publications (1)

Publication Number Publication Date
CN103227992A true CN103227992A (en) 2013-07-31

Family

ID=48838209

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101103509A Pending CN103227992A (en) 2013-04-01 2013-04-01 Android terminal-based vulnerability scanning system

Country Status (1)

Country Link
CN (1) CN103227992A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103501496A (en) * 2013-09-26 2014-01-08 国家电网公司 Detection device based on IEEE802.11 wireless communication safety in intelligent electric network
CN103996007A (en) * 2014-05-29 2014-08-20 诸葛建伟 Testing method and system for Android application permission leakage vulnerabilities
CN105095737A (en) * 2014-04-16 2015-11-25 阿里巴巴集团控股有限公司 Method and device for detecting weak password
CN105243329A (en) * 2015-10-26 2016-01-13 北京奇虎科技有限公司 Method and system for vulnerability discovery of Android system
CN105389510A (en) * 2015-12-14 2016-03-09 江山市同舟数码科技有限公司 Android mobile device malicious software detection method and system
CN105915565A (en) * 2016-06-30 2016-08-31 浙江宇视科技有限公司 Authentication method, device and system
CN106033512A (en) * 2015-03-20 2016-10-19 中兴通讯股份有限公司 Security vulnerability reinforcing method and system
CN106919844A (en) * 2017-02-14 2017-07-04 暨南大学 A kind of android system vulnerability of application program detection method
CN106921731A (en) * 2017-01-24 2017-07-04 北京奇虎科技有限公司 Leak restorative procedure and device
CN107392033A (en) * 2017-08-30 2017-11-24 杭州安恒信息技术有限公司 A kind of Android device Permeation Test System and its automation penetration testing method
CN107592302A (en) * 2017-08-23 2018-01-16 北京国信云服科技有限公司 The port scanner and method of a kind of mobile terminal
CN109067709A (en) * 2018-07-06 2018-12-21 北京知道创宇信息技术有限公司 A kind of Vulnerability Management method, apparatus, electronic equipment and storage medium
CN113190837A (en) * 2021-03-29 2021-07-30 贵州电网有限责任公司 Web attack behavior detection method and system based on file service system
CN114021144A (en) * 2021-11-08 2022-02-08 安天科技集团股份有限公司 Software vulnerability detection method and device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7424746B1 (en) * 2001-11-30 2008-09-09 Mcafee, Inc. Intrusion detection and vulnerability assessment system, method and computer program product
CN102222184A (en) * 2011-05-17 2011-10-19 中兴通讯股份有限公司 Method and system for killing mobile terminal viruses
CN102945351A (en) * 2012-11-05 2013-02-27 中国科学院软件研究所 Security vulnerability fixing method based on two-dimensional code for mobile intelligent terminal in cloud environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7424746B1 (en) * 2001-11-30 2008-09-09 Mcafee, Inc. Intrusion detection and vulnerability assessment system, method and computer program product
CN102222184A (en) * 2011-05-17 2011-10-19 中兴通讯股份有限公司 Method and system for killing mobile terminal viruses
CN102945351A (en) * 2012-11-05 2013-02-27 中国科学院软件研究所 Security vulnerability fixing method based on two-dimensional code for mobile intelligent terminal in cloud environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
罗玉斌: "网络安全漏洞扫描系统的涉及与实现", 《中国优秀硕士论文全文数据库》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103501496A (en) * 2013-09-26 2014-01-08 国家电网公司 Detection device based on IEEE802.11 wireless communication safety in intelligent electric network
CN105095737B (en) * 2014-04-16 2019-03-01 阿里巴巴集团控股有限公司 The method and apparatus for detecting weak password
CN105095737A (en) * 2014-04-16 2015-11-25 阿里巴巴集团控股有限公司 Method and device for detecting weak password
CN103996007A (en) * 2014-05-29 2014-08-20 诸葛建伟 Testing method and system for Android application permission leakage vulnerabilities
CN106033512A (en) * 2015-03-20 2016-10-19 中兴通讯股份有限公司 Security vulnerability reinforcing method and system
CN105243329A (en) * 2015-10-26 2016-01-13 北京奇虎科技有限公司 Method and system for vulnerability discovery of Android system
CN105389510A (en) * 2015-12-14 2016-03-09 江山市同舟数码科技有限公司 Android mobile device malicious software detection method and system
CN105915565A (en) * 2016-06-30 2016-08-31 浙江宇视科技有限公司 Authentication method, device and system
CN106921731B (en) * 2017-01-24 2021-06-22 北京奇虎科技有限公司 Vulnerability repair method and device
CN106921731A (en) * 2017-01-24 2017-07-04 北京奇虎科技有限公司 Leak restorative procedure and device
CN106919844B (en) * 2017-02-14 2019-08-02 暨南大学 A kind of android system vulnerability of application program detection method
CN106919844A (en) * 2017-02-14 2017-07-04 暨南大学 A kind of android system vulnerability of application program detection method
CN107592302A (en) * 2017-08-23 2018-01-16 北京国信云服科技有限公司 The port scanner and method of a kind of mobile terminal
CN107592302B (en) * 2017-08-23 2021-07-20 北京国信云服科技有限公司 Port scanner and method for mobile terminal
CN107392033A (en) * 2017-08-30 2017-11-24 杭州安恒信息技术有限公司 A kind of Android device Permeation Test System and its automation penetration testing method
CN107392033B (en) * 2017-08-30 2019-12-31 杭州安恒信息技术股份有限公司 Android device penetration test system and automatic penetration test method thereof
CN109067709A (en) * 2018-07-06 2018-12-21 北京知道创宇信息技术有限公司 A kind of Vulnerability Management method, apparatus, electronic equipment and storage medium
CN109067709B (en) * 2018-07-06 2021-08-06 北京知道创宇信息技术股份有限公司 Vulnerability management method and device, electronic equipment and storage medium
CN113190837A (en) * 2021-03-29 2021-07-30 贵州电网有限责任公司 Web attack behavior detection method and system based on file service system
CN114021144A (en) * 2021-11-08 2022-02-08 安天科技集团股份有限公司 Software vulnerability detection method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN103227992A (en) Android terminal-based vulnerability scanning system
US11463458B2 (en) Protecting against and learning attack vectors on web artifacts
Antonakakis et al. Understanding the mirai botnet
US9584543B2 (en) Method and system for web integrity validator
KR101386097B1 (en) Platform validation and management of wireless devices
EP2748751B1 (en) System and method for day-zero authentication of activex controls
Nasr et al. Power jacking your station: In-depth security analysis of electric vehicle charging station management systems
Giaretta et al. Adding salt to pepper: A structured security assessment over a humanoid robot
US20150031332A1 (en) Network and data security testing with mobile devices
CN104468632A (en) Loophole attack prevention method, device and system
D'Orazio et al. A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps
Wang et al. A new cross-site scripting detection mechanism integrated with HTML5 and CORS properties by using browser extensions
Ray et al. Bluetooth low energy devices security testing framework
Makrakis et al. Vulnerabilities and attacks against industrial control systems and critical infrastructures
Pistoia et al. Labyrinth: Visually configurable data-leakage detection in mobile applications
Gür et al. Security analysis of computer networks: Key concepts and methodologies
Liebl et al. Analyzing the attack surface and threats of industrial Internet of Things devices
Knockel et al. Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd.
Karl et al. No keys to the kingdom required: a comprehensive investigation of missing authentication vulnerabilities in the wild
KR20100124441A (en) Apparatus and method for inspecting a contents and controlling apparatus of malignancy code
Bai et al. TD‐WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites
de Carné de Carnavalet Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem
Herodotou et al. Spying on the Spy: Security Analysis of Hidden Cameras
Ferronato Iot white worms: design and application
Cui Embedded system security: A software-based approach

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130731