CN104866769A - Vulnerability analyzing method and system based on fingerprint acquisition of business system host - Google Patents

Vulnerability analyzing method and system based on fingerprint acquisition of business system host Download PDF

Info

Publication number
CN104866769A
CN104866769A CN201510293091.7A CN201510293091A CN104866769A CN 104866769 A CN104866769 A CN 104866769A CN 201510293091 A CN201510293091 A CN 201510293091A CN 104866769 A CN104866769 A CN 104866769A
Authority
CN
China
Prior art keywords
main frame
leak
operation system
system main
vulnerability
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510293091.7A
Other languages
Chinese (zh)
Inventor
魏理豪
艾解清
刘生寒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Center of Guangdong Power Grid Co Ltd
Original Assignee
Information Center of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Center of Guangdong Power Grid Co Ltd filed Critical Information Center of Guangdong Power Grid Co Ltd
Priority to CN201510293091.7A priority Critical patent/CN104866769A/en
Publication of CN104866769A publication Critical patent/CN104866769A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Abstract

The present invention discloses a vulnerability analyzing method and a vulnerability analyzing system based on the fingerprint acquisition of a business system host. The vulnerability analyzing method comprises the steps of: A, acquiring the fingerprint information of the business system host by an open source tool, wherein the fingerprint information is used for recognizing the business system host; and B, carrying out regular contrast by a preset regular expression and the acquired corresponding fingerprint information, if successfully carrying out contrast, making the judgment that the business system host has vulnerability. Through the vulnerability analyzing method disclosed by the present invention, rapid searching can be carried out in a large-area host group, and a certain business system host suspected to have vulnerability can be found out through analysis, so that a security manager can be aware of the distributing situation of a certain vulnerability inside an enterprise in a short time, and a great quantity of processing time is bought for vulnerability patch work.

Description

A kind of leak analysis method and system based on operation system main frame fingerprint collecting
Technical field
The present invention relates to Hole Detection field, particularly relate to a kind of leak analysis method and system based on operation system main frame fingerprint collecting.
Background technology
Along with the development of network, development technique is maked rapid progress, and various serviced component is as emerged rapidly in large numbersBamboo shoots after a spring rain, and the various core systems of enterprises select different operating system, Development Framework and middleware to build according to respective traffic performance.When certain operating system, Development Framework or middleware produce high-risk leak, for the operation system that enterprises uses this technology, impact is huge.
For this problem, the solution of prior art writes separately a recognizer for concrete leak, and the corresponding leak inspect statement of every secondary write, carries out network interaction with goal systems.But this method detection efficiency is lower, and spended time is long, is unfavorable for quick detection.
Therefore, prior art has yet to be improved and developed.
Summary of the invention
In view of above-mentioned the deficiencies in the prior art, the object of the present invention is to provide a kind of leak analysis method and system based on operation system main frame fingerprint collecting, be intended to solve the inefficient problem of existing leak detection method.
Technical scheme of the present invention is as follows:
Based on a leak analysis method for operation system main frame fingerprint collecting, wherein, comprise step:
A, finger print information by Open-Source Tools capturing service system host, described finger print information is used for identification services system host;
B, by the regular expression that presets to collect corresponding finger print information and carry out canonical contrast, as contrasted successfully, then judge that this operation system main frame exists leak.
The described leak analysis method based on operation system main frame fingerprint collecting, wherein, described finger print information comprises the operating system of operation system main frame, the type of middleware, the version of middleware, the service of developing and port.
The described leak analysis method based on operation system main frame fingerprint collecting, wherein, comprises before described steps A:
Regular expression is set up in advance according to different leak types and leak danger classes.
The described leak analysis method based on operation system main frame fingerprint collecting, wherein, described Open-Source Tools is nmap, dnseumn or whatweb.
Based on a vulnerability analysis system for operation system main frame fingerprint collecting, wherein, comprising:
Acquisition module, for the finger print information by Open-Source Tools capturing service system host, described finger print information is used for identification services system host;
Analysis module, for the regular expression by presetting to collect corresponding finger print information and carry out canonical contrast, as contrasted successfully, then judge that this operation system main frame exists leak.
The described vulnerability analysis system based on operation system main frame fingerprint collecting, wherein, described finger print information comprises the operating system of operation system main frame, the type of middleware, the version of middleware, the service of developing and port.
The described vulnerability analysis system based on operation system main frame fingerprint collecting, wherein, also comprises:
Presetting module, for setting up regular expression according to different leak types and leak danger classes in advance.
The described vulnerability analysis system based on operation system main frame fingerprint collecting, wherein, described Open-Source Tools is nmap, dnseumn or whatweb.
Beneficial effect: quick-searching can be carried out in large area main frame group by leak analysis method of the present invention, analyze the operation system main frame that certain may exist leak, thus allow safety officer understand the distribution situation of certain leak in enterprises at short notice, for a large amount of processing times is striven in leak repairing work.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of a kind of leak analysis method preferred embodiment based on operation system main frame fingerprint collecting of the present invention.
Fig. 2 is the structured flowchart of a kind of vulnerability analysis system preferred embodiment based on operation system main frame fingerprint collecting of the present invention.
Embodiment
The invention provides a kind of leak analysis method and system based on operation system main frame fingerprint collecting, for making object of the present invention, technical scheme and effect clearly, clearly, the present invention is described in more detail below.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Refer to Fig. 1, Fig. 1 is the process flow diagram of a kind of leak analysis method preferred embodiment based on operation system main frame fingerprint collecting of the present invention, and it comprises step:
S101, finger print information by Open-Source Tools capturing service system host, described finger print information is used for identification services system host;
S102, by the regular expression that presets to collect corresponding finger print information and carry out canonical contrast, as contrasted successfully, then judge that this operation system main frame exists leak.
Further, described finger print information comprises the operating system of operation system main frame, the type of middleware, the version of middleware, the service of developing and port.Said finger print information essence refers to, operation system information in internet computer, and right and wrong are unique, the information of computer for identifying likely repeated.
Further, comprise before described step S101:
Regular expression is set up in advance according to different leak types and leak danger classes.
Regular expression, also known as normal representation method, conventional expressing method, regular expression its use single character string to describe, mate a series of character string meeting certain syntactic rule.In a lot of text editor, regular expression is usually used to retrieval, replaces those texts meeting certain pattern.
The present invention is that initiatively the disposable operation system main frame finger print information for assembly (having the system of potential problems or region) contrasts, so relative traditional solution, substantially increase work efficiency, thus leave safety manager's abundant processing time for.
Further, described Open-Source Tools is nmap, dnseumn or whatweb.Wherein nmap is a network link scanning software, is used for scanning the open network link of online computer.Determine which service operation is at those links, and infer which operating system computer run (this is also known as fingerprinting).It is network manager must one of software, and to ensure public security in order to critic network system.WhatWeb is a website fingerprint identification facility, mainly for problem be: " this website use what technology? " WhatWeb can tell that the program of use is built in your website, comprises which kind of CMS system, what blog system, Javascript storehouse, web server, embedded devices etc.WhatWeb has more than 900 plug-in units, and can identify version number, email address, account, web framework, sql error etc.
Based on said method, the present invention also provides a kind of vulnerability analysis system preferred embodiment based on operation system main frame fingerprint collecting, and as shown in Figure 2, it comprises:
Acquisition module 100, for the finger print information by Open-Source Tools capturing service system host, described finger print information is used for identification services system host;
Analysis module 200, for the regular expression by presetting to collect corresponding finger print information and carry out canonical contrast, as contrasted successfully, then judge that this operation system main frame exists leak.
Further, described finger print information comprises the operating system of operation system main frame, the type of middleware, the version of middleware, the service of developing and port.
Further, described system also comprises:
Presetting module, for setting up regular expression according to different leak types and leak danger classes in advance.
Further, described Open-Source Tools is nmap, dnseumn or whatweb.
Ins and outs about above-mentioned module are existing in method above to be described in detail, therefore repeats no more.
Quick-searching can be carried out in large area main frame group in sum by leak analysis method of the present invention, analyze the operation system main frame that certain may exist leak, thus allow safety officer understand the distribution situation of certain leak in enterprises at short notice, for a large amount of processing times is striven in leak repairing work.
Should be understood that, application of the present invention is not limited to above-mentioned citing, for those of ordinary skills, can be improved according to the above description or convert, and all these improve and convert the protection domain that all should belong to claims of the present invention.

Claims (8)

1., based on a leak analysis method for operation system main frame fingerprint collecting, it is characterized in that, comprise step:
A, finger print information by Open-Source Tools capturing service system host, described finger print information is used for identification services system host;
B, by the regular expression that presets to collect corresponding finger print information and carry out canonical contrast, as contrasted successfully, then judge that this operation system main frame exists leak.
2. the leak analysis method based on operation system main frame fingerprint collecting according to claim 1, it is characterized in that, described finger print information comprises the operating system of operation system main frame, the type of middleware, the version of middleware, the service of developing and port.
3. the leak analysis method based on operation system main frame fingerprint collecting according to claim 1, is characterized in that, comprise before described steps A:
Regular expression is set up in advance according to different leak types and leak danger classes.
4. the leak analysis method based on operation system main frame fingerprint collecting according to claim 1, is characterized in that, described Open-Source Tools is nmap, dnseumn or whatweb.
5. based on a vulnerability analysis system for operation system main frame fingerprint collecting, it is characterized in that, comprising:
Acquisition module, for the finger print information by Open-Source Tools capturing service system host, described finger print information is used for identification services system host;
Analysis module, for the regular expression by presetting to collect corresponding finger print information and carry out canonical contrast, as contrasted successfully, then judge that this operation system main frame exists leak.
6. the vulnerability analysis system based on operation system main frame fingerprint collecting according to claim 5, it is characterized in that, described finger print information comprises the operating system of operation system main frame, the type of middleware, the version of middleware, the service of developing and port.
7. the vulnerability analysis system based on operation system main frame fingerprint collecting according to claim 5, is characterized in that, also comprise:
Presetting module, for setting up regular expression according to different leak types and leak danger classes in advance.
8. the vulnerability analysis system based on operation system main frame fingerprint collecting according to claim 5, is characterized in that, described Open-Source Tools is nmap, dnseumn or whatweb.
CN201510293091.7A 2015-06-01 2015-06-01 Vulnerability analyzing method and system based on fingerprint acquisition of business system host Pending CN104866769A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510293091.7A CN104866769A (en) 2015-06-01 2015-06-01 Vulnerability analyzing method and system based on fingerprint acquisition of business system host

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510293091.7A CN104866769A (en) 2015-06-01 2015-06-01 Vulnerability analyzing method and system based on fingerprint acquisition of business system host

Publications (1)

Publication Number Publication Date
CN104866769A true CN104866769A (en) 2015-08-26

Family

ID=53912591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510293091.7A Pending CN104866769A (en) 2015-06-01 2015-06-01 Vulnerability analyzing method and system based on fingerprint acquisition of business system host

Country Status (1)

Country Link
CN (1) CN104866769A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108183895A (en) * 2017-12-26 2018-06-19 广东电网有限责任公司信息中心 A kind of networked asset information acquisition system
CN112001376B (en) * 2020-10-29 2021-02-26 深圳开源互联网安全技术有限公司 Fingerprint identification method, device, equipment and storage medium based on open source component

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242279A (en) * 2008-03-07 2008-08-13 北京邮电大学 Automatic penetration testing system and method for WEB system
CN101902470A (en) * 2010-07-14 2010-12-01 南京大学 Form feature-based Web security vulnerability dynamic testing method
WO2012142584A1 (en) * 2011-04-15 2012-10-18 Bluecava, Inc. Detection of spoofing of remote client system information
CN103065095A (en) * 2013-01-29 2013-04-24 四川大学 WEB vulnerability scanning method and vulnerability scanner based on fingerprint recognition technology
CN103685575A (en) * 2014-01-06 2014-03-26 洪高颖 Website security monitoring method based on cloud architecture

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242279A (en) * 2008-03-07 2008-08-13 北京邮电大学 Automatic penetration testing system and method for WEB system
CN101902470A (en) * 2010-07-14 2010-12-01 南京大学 Form feature-based Web security vulnerability dynamic testing method
WO2012142584A1 (en) * 2011-04-15 2012-10-18 Bluecava, Inc. Detection of spoofing of remote client system information
CN103065095A (en) * 2013-01-29 2013-04-24 四川大学 WEB vulnerability scanning method and vulnerability scanner based on fingerprint recognition technology
CN103685575A (en) * 2014-01-06 2014-03-26 洪高颖 Website security monitoring method based on cloud architecture

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108183895A (en) * 2017-12-26 2018-06-19 广东电网有限责任公司信息中心 A kind of networked asset information acquisition system
CN108183895B (en) * 2017-12-26 2021-03-12 广东电网有限责任公司信息中心 Network asset information acquisition system
CN112001376B (en) * 2020-10-29 2021-02-26 深圳开源互联网安全技术有限公司 Fingerprint identification method, device, equipment and storage medium based on open source component

Similar Documents

Publication Publication Date Title
CN109525595B (en) Black product account identification method and equipment based on time flow characteristics
CN103699693B (en) A kind of data quality management method based on metadata and system
US20210035126A1 (en) Data processing method, system and computer device based on electronic payment behaviors
CN105068925A (en) Software security flaw discovering system
CN103336766A (en) Short text garbage identification and modeling method and device
CN109241014B (en) Data processing method and device and server
CN109934227A (en) System for recognizing characters from image and method
CN105426759A (en) URL legality determining method and apparatus
CN103905379A (en) Method for identifying internet users and device thereof
CN102073912A (en) Data quality control method, device and system
CN101561806B (en) Information extraction and audit method of DB2 database operation, device and system thereof
CN105095330A (en) Method and system for identifying file format based on compressed package content
CN103701769A (en) Method and system for detecting hazardous network source
CN104751053A (en) Static behavior analysis method of mobile smart terminal software
CN104732425A (en) E-commerce platform customer behavior analytical method based on big data
JP2016099857A (en) Fraudulent program handling system and fraudulent program handling method
CN103902906A (en) Mobile terminal malicious code detecting method and system based on application icon
CN104866769A (en) Vulnerability analyzing method and system based on fingerprint acquisition of business system host
CN108920955B (en) Webpage backdoor detection method, device, equipment and storage medium
CN111581110B (en) Service data accuracy detection method, device, system and storage medium
CN116107589B (en) Automatic compiling method, device and equipment of software codes and storage medium
CN102707943A (en) Implementation method of remote control automation tool
CN107463493A (en) A kind of test system and method for testing towards host antivirus software product
CN108985059B (en) Webpage backdoor detection method, device, equipment and storage medium
CN109829713B (en) Mobile payment mode identification method based on common drive of knowledge and data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150826