CN106789926A - Multi-process automatic SQL injection batch scanning tool and method - Google Patents

Multi-process automatic SQL injection batch scanning tool and method Download PDF

Info

Publication number
CN106789926A
CN106789926A CN201611064242.2A CN201611064242A CN106789926A CN 106789926 A CN106789926 A CN 106789926A CN 201611064242 A CN201611064242 A CN 201611064242A CN 106789926 A CN106789926 A CN 106789926A
Authority
CN
China
Prior art keywords
scanning
sql
sql injection
request
batch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611064242.2A
Other languages
Chinese (zh)
Inventor
赵学鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Software Group Co Ltd
Original Assignee
Inspur Software Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Software Group Co Ltd filed Critical Inspur Software Group Co Ltd
Priority to CN201611064242.2A priority Critical patent/CN106789926A/en
Publication of CN106789926A publication Critical patent/CN106789926A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The invention discloses a multi-process automatic SQL injection batch scanning tool and a method, comprising a request module, a distribution module and a summary module, wherein the request module is used for requesting the batch parameter processing of files; the distribution module is used for intelligently distributing and scanning task processes, namely automatically distributing and scanning tasks according to the process number set by a user and starting corresponding processes for osmotic scanning; the summarizing module is used for intelligently summarizing and analyzing the scanning results, namely automatically storing and detecting the scanning results and extracting the request and the detailed results with sql injection vulnerabilities, and the method is realized based on the scanning tool. Compared with the prior art, the multi-process automatic SQL injection batch scanning tool and method can automatically perform batch SQL injection automatic scanning on orders of magnitude requests of tens of thousands and above under the unattended condition, greatly improve the permeation efficiency of product safety detection, greatly save manpower and material resources for regression testing after safety problem repair, have strong practicability and wide application range, and are easy to popularize.

Description

A kind of multi-process automates SQL injection batch scanning instrument and method
Technical field
The present invention relates to Computer Applied Technology field, specifically a kind of practical, multi-process automation SQL notes Enter batch scanning instrument and method.
Background technology
The scanning tools of sql injection loopholes that are directed to existing at present are joined only in single request or single url Number is scanned, and manual analysis each http request is required for each operation of a web system, and to wherein existing The request of parameter performs SQL injection scanning.If carrying out batch Liquid penetrant testing in face of large-scale web system, for tens thousand of Request is taken considerable time, human cost, it is necessary to perform tens of thousands of time repeated and redundants operations.
In consideration of it, existing provide a kind of based on multi-process automation SQL injection batch scanning instrument and method, how right solve The request of one all http of complete web or C/S systems unify asking for the scanning of the batch-automated SQL injection of high efficiency Topic.
The content of the invention
Technical assignment of the invention is directed to above weak point, there is provided a kind of practical, multi-process automation SQL notes Enter batch scanning instrument and method.
A kind of multi-process automates SQL injection batch scanning instrument, including request module, distribution module and summarizing module, Wherein,
Request module is used for demand file batch parameter processing;
Distribution module is used for task process intelligently distribution scanning, i.e., set into number of passes automatic distributing scan task and open according to user Opening corresponding process carries out infiltration scanning;
Summarizing module is used for scanning result intelligence Macro or mass analysis, that is, automatically save and detect scanning result, and extraction has sql injections The request of leak and detailed results.
The request module specifies the root path address of whole demand file preservation by user, to whole under path File is analyzed screening, selects the demand file that can be scanned, then active session information, the data according to user configuring Storehouse server and enter number of passes, perform batch text treatment to request automatically and responded with ensureing that request can normally obtain server.
The distribution module is used to open the process for specifying number, and realizes that multi-process mass simultaneous carry out sql injection scannings, The whole parameters of distribution module identification in scanning process, and all parameters are sent with test statement, analysis responds to judge that sql is noted Enter.
After whole is scanned, there is sql injection loopholes in Intelligent Measurement whole scanning results, retrieval to the summarizing module Request and by leak request scanning result be aggregated into assigned catalogue, be user-friendly for result statistics and specifically check.
A kind of multi-process automates SQL injection batch scanning method, and its implementation process is:
All requests in web system are obtained first;
The demand file is extracted by above-mentioned scanning tools, and demand file is pre-processed;
Process task is distributed, SQL injection is judged, i.e., opens the process for specifying number simultaneously, realize that multi-process mass simultaneous enter Row sql injections are scanned, and whole parameters are recognized in scanning process, and all parameters are sent with test statement, and analysis responds to judge Sql injects;
After the end of scan, whole scanning results are carried out with quick-searching, lookup has the scanning result of sql injections, and unified remittance Always pressed from both sides to glue file, convenient use person checks operation result.
The process of all requests is in acquisition web system:By packet capturing Software tool, use what is manually or automatically clicked on Mode, all requests in web system is all captured, and save as several txt files.
Obtain demand file and the process that is pre-processed is:Path where the demand file of user's input is received first Catalogue, by all asking the text that preserves in web system under the directory path, then scanning tools automatically scanning path Directory file structure is simultaneously recorded, and whole suffix are the demand file of txt under extracting this path, and finally whole demand files are carried out Pretreatment:Cookie value batches canonical is replaced, it is ensured that cookie information is effective in current web system in demand file after replacement Cookie values, it is ensured that the penetration attack request sent in infiltration scanning process can be by program normal response.
It is by the process that process task is distributed:First result files are automatically created under current path to be swept for storage Result is retouched, to carrying out overlapping operation if it there is result files, is created with user in result files Identical folder structure under input path, to realize the differentiation of file scan result of the same name under different directories;Then receiving makes The process of user's input opens number x, is intelligently distributed by program, creates x autoexec, already present autoexec Then delete, the scan command that sql injections are performed to each demand file is written in x autoexec successively, now open X process is opened, is that each process distributes an errorlevel, perform sql implantation tool scan commands, started to all files Multi-process batch sql injection scannings are carried out simultaneously.
Multi-process batch scanning terminates rear operation result and preserves the process of detection:
After sql injection batch scannings are finished, according to request catalogue storage hierarchical relationship, the sql notes of each request are automatically saved Enter scanning result file, destination file name asks to correspond with place path and source;
Whole result results are analyzed automatically after preservation, automatic identification has the scanning result file of sql injections, and will This document is aggregated under assigned catalogue automatically;
After the completion of scanning tools operation, the request scanning result for being all in sql injection loopholes is recorded under assigned catalogue path.
The scanning result of record include exist decanting point parameter, send injection sentence, by infiltration obtain be tested Server OS, middleware information.
A kind of multi-process automation SQL injection batch scanning instrument and method of the invention, with advantages below:
A kind of multi-process automation SQL injection batch scanning instrument of the invention and method can be in the case of unattended certainly The dynamic order of magnitude request to tens thousand of ranks and the above carries out batch sql injection automatic scannings, substantially increases product safety inspection Osmotic efficiency is surveyed, the manpower and materials of regression test after safety problem is repaired is greatlyd save, compared to manually carrying out sql injections in the past Batch detection, time and workload reduce 90%, practical, applied widely, it is easy to promote.
Brief description of the drawings
Accompanying drawing 1 realizes flow chart for of the invention.
Specific embodiment
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings.
The present invention solves that the request of all http of complete web or C/S systems is carried out to unify high efficiency batch automatically Change the scanning of SQL injection.After being effectively treated to high-volume demand file, multiple processes are automatically turned on simultaneously to demand file Sql injections scanning and penetration testing are carried out, and clearly preserve each to ask scanning result and automatically retrieval to there is sql injections The request of leak and scanning result file.Realize that request of the unattended automation to tens thousand of or hundreds thousand of ranks carries out batch and ooze Test thoroughly.
A kind of multi-process automates SQL injection batch scanning instrument, including request module, distribution module and summarizing module, Wherein,
Request module is used for demand file batch parameter processing;
Distribution module is used for task process intelligently distribution scanning, i.e., set into number of passes automatic distributing scan task and open according to user Opening corresponding process carries out infiltration scanning;
Summarizing module is used for scanning result intelligence Macro or mass analysis, that is, automatically save and detect scanning result, and extraction has sql injections The request of leak and detailed results.
The request module specifies the root path address of whole demand file preservation by user, to whole under path File is analyzed screening, selects the demand file that can be scanned, then active session information, the data according to user configuring Storehouse server and enter number of passes, perform batch text treatment to request automatically and responded with ensureing that request can normally obtain server, While batch injection efficiency is improved, reduction is failed to report.
The distribution module is used to open the process for specifying number, and realizes that multi-process mass simultaneous carry out sql injection scannings, The whole parameters of distribution module identification in scanning process, and all parameters are sent with test statement, analysis responds to judge that sql is noted Enter.
After whole is scanned, there is sql injection loopholes in Intelligent Measurement whole scanning results, retrieval to the summarizing module Request and by leak request scanning result be aggregated into assigned catalogue, be user-friendly for result statistics and specifically check.
As shown in Figure 1, a kind of multi-process automation SQL injection batch scanning method, this method can be carried out based on request The sql injection intelligent scannings of file and url, are recorded comprising scanning process and result, but this method is realized in face of large-scale system During the demand file of system or big number of levels, batch processing and operation can be carried out to big number requests file, by demand file Intelligence is distributed in multiple subprocess, realizes multi-process task scheduling, accelerates request sql injection sweep speeds;Simultaneously can be right Scanning result carries out quick-searching and treatment, realizes unattended full-automatic sql injections batch scanning.
Its implementation process is:
1)All requests in web system are obtained first;
User passes through the instruments such as packet capturing software such as fiddler first, using the mode manually or automatically clicked on, by web systems All requests are all captured in system, and save as multiple txt files, are then turned on this scanning tools.
2)The demand file is extracted by above-mentioned scanning tools, and demand file is pre-processed;
3)Process task is distributed, SQL injection is judged, i.e., opens the process for specifying number simultaneously, realize multi-process mass simultaneous Carry out sql injections to scan, whole parameters are recognized in scanning process, and all parameters are sent with test statement, analysis responds to sentence Disconnected sql injections;
4)After the end of scan, whole scanning results are carried out with quick-searching, lookup has the scanning result of sql injections, and unified Glue file folder is aggregated into, convenient use person checks operation result.
Obtain demand file and the process that is pre-processed is:Path where the demand file of user's input is received first Catalogue, by all asking the text that preserves in web system under the directory path, then scanning tools automatically scanning path Directory file structure is simultaneously recorded, and whole suffix are the demand file of txt under extracting this path, and finally whole demand files are carried out Pretreatment:Cookie value batches canonical is replaced, it is ensured that cookie information is effective in current web system in demand file after replacement Cookie values, it is ensured that the penetration attack request sent in infiltration scanning process can be by program normal response.
It is by the process that process task is distributed:First result files are automatically created under current path to be swept for storage Result is retouched, to carrying out overlapping operation if it there is result files, is created with user in result files Identical folder structure under input path, to realize the differentiation of file scan result of the same name under different directories;Then receiving makes The process of user's input opens number x, is intelligently distributed by program, creates x autoexec, already present autoexec Then delete, the scan command that sql injections are performed to each demand file is written in x autoexec successively, now open X process is opened, is that each process distributes an errorlevel, perform sql implantation tool scan commands, started to all files Multi-process batch sql injection scannings are carried out simultaneously.
Multi-process batch scanning terminates rear operation result and preserves the process of detection:
After sql injection batch scannings are finished, according to request catalogue storage hierarchical relationship, the sql notes of each request are automatically saved Enter scanning result file, destination file name asks to correspond with place path and source;
Whole result results are analyzed automatically after preservation, automatic identification has the scanning result file of sql injections, and will This document is aggregated into assigned catalogue automatically " result sql injection problem collect " under.
After the completion of instrument operation, under path, sql injections are as all at " result sql injections problem collect " The request scanning result record of leak, the quilt for contain the parameter that there is decanting point, the injection sentence for sending, obtaining by infiltration Survey the information such as server OS, middleware.
Above-mentioned specific embodiment is only specific case of the invention, and scope of patent protection of the invention is included but is not limited to Above-mentioned specific embodiment, any a kind of multi-process automation SQL injection batch scanning instrument of the invention and method of meeting The appropriate change or replacement that claims and any technical field those of ordinary skill is done to it, should all fall into Scope of patent protection of the invention.

Claims (10)

1. a kind of multi-process automation SQL injection batch scanning instrument, it is characterised in that including request module, distribution module and Summarizing module, wherein,
Request module is used for demand file batch parameter processing;
Distribution module is used for task process intelligently distribution scanning, i.e., set into number of passes automatic distributing scan task and open according to user Opening corresponding process carries out infiltration scanning;
Summarizing module is used for scanning result intelligence Macro or mass analysis, that is, automatically save and detect scanning result, and extraction has sql injections The request of leak and detailed results.
2. a kind of multi-process according to claim 1 automates SQL injection batch scanning instrument, it is characterised in that described Request module specifies the root path address of whole demand file preservation by user, and all files under path are analyzed Screening, selects the demand file that can be scanned, and active session information then according to user configuring, database server and enters Number of passes, batch text treatment is performed to request and is responded with ensureing that request can normally obtain server automatically.
3. a kind of multi-process according to claim 1 automates SQL injection batch scanning instrument, it is characterised in that described Distribution module is used to open the process for specifying number, and realizes that multi-process mass simultaneous carry out sql injection scannings, should in scanning process The whole parameters of distribution module identification, and all parameters are sent with test statement, analysis responds to judge that sql injects.
4. a kind of multi-process according to claim 1 automates SQL injection batch scanning instrument, it is characterised in that described After all scanned, there is the request of sql injection loopholes and will leakage in Intelligent Measurement whole scanning results, retrieval to summarizing module Hole request scanning result is aggregated into assigned catalogue, is user-friendly for result statistics and specifically checks.
5. a kind of multi-process automation SQL injection batch scanning method, automatic based on a kind of multi-process described in claim 1-4 Change SQL injection batch scanning instrument, it is characterised in that its implementation process is:
All requests in web system are obtained first;
The demand file is extracted by above-mentioned scanning tools, and demand file is pre-processed;
Process task is distributed, SQL injection is judged, i.e., opens the process for specifying number simultaneously, realize that multi-process mass simultaneous enter Row sql injections are scanned, and whole parameters are recognized in scanning process, and all parameters are sent with test statement, and analysis responds to judge Sql injects;
After the end of scan, whole scanning results are carried out with quick-searching, lookup has the scanning result of sql injections, and unified remittance Always pressed from both sides to glue file, convenient use person checks operation result.
6. a kind of multi-process according to claim 5 automates SQL injection batch scanning method, it is characterised in that obtain The process of all requests is in web system:By packet capturing Software tool, using the mode manually or automatically clicked on, by web systems All requests are all captured in system, and save as several txt files.
7. a kind of multi-process according to claim 5 automates SQL injection batch scanning method, it is characterised in that obtain The demand file and process for being pre-processed is:Route directory, the catalogue where the demand file of user's input are received first By all asking the text that preserves in web system under path, then scanning tools automatically scanning route directory file knot Structure is simultaneously recorded, and whole suffix are the demand file of txt under extracting this path, and finally whole demand files are pre-processed: Cookie value batches canonical is replaced, it is ensured that cookie information is effectively cookie in current web system in demand file after replacement Value, it is ensured that the penetration attack request sent in infiltration scanning process can be by program normal response.
8. a kind of multi-process according to claim 5 automates SQL injection batch scanning method, it is characterised in that will enter Journey task distribution process be:Result files are automatically created under current path first for depositing scanning result, if There is result files then to carrying out overlapping operation, created in result files with phase under user's input path With folder structure, to realize the differentiation of file scan result of the same name under different directories;Then entering for user's input is received Cheng Kaiqi number x, are intelligently distributed by program, create x autoexec, and already present autoexec is then deleted, will be right The scan command that each demand file performs sql injections is written in x autoexec successively, now opens x process, is Each process distributes an errorlevel, performs sql implantation tool scan commands, starts to all files while enter more Journey batch sql injection scannings.
9. a kind of multi-process according to claim 8 automates SQL injection batch scanning method, it is characterised in that enter more Journey batch scanning terminates rear operation result and preserves the process of detection:
After sql injection batch scannings are finished, according to request catalogue storage hierarchical relationship, the sql notes of each request are automatically saved Enter scanning result file, destination file name asks to correspond with place path and source;
Whole result results are analyzed automatically after preservation, automatic identification has the scanning result file of sql injections, and will This document is aggregated under assigned catalogue automatically;
After the completion of scanning tools operation, the request scanning result for being all in sql injection loopholes is recorded under assigned catalogue path.
10. a kind of multi-process according to claim 9 automates SQL injection batch scanning method, it is characterised in that record Scanning result include the parameter that there is decanting point, the injection sentence for sending, by permeating the tested server operation system that obtains System, middleware information.
CN201611064242.2A 2016-11-28 2016-11-28 Multi-process automatic SQL injection batch scanning tool and method Pending CN106789926A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611064242.2A CN106789926A (en) 2016-11-28 2016-11-28 Multi-process automatic SQL injection batch scanning tool and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611064242.2A CN106789926A (en) 2016-11-28 2016-11-28 Multi-process automatic SQL injection batch scanning tool and method

Publications (1)

Publication Number Publication Date
CN106789926A true CN106789926A (en) 2017-05-31

Family

ID=58901921

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611064242.2A Pending CN106789926A (en) 2016-11-28 2016-11-28 Multi-process automatic SQL injection batch scanning tool and method

Country Status (1)

Country Link
CN (1) CN106789926A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959935A (en) * 2018-06-25 2018-12-07 郑州云海信息技术有限公司 A kind of loophole plug-in unit batch execution method and device
CN111783105A (en) * 2020-07-08 2020-10-16 国家计算机网络与信息安全管理中心 Penetration testing method, device, equipment and storage medium
CN111859401A (en) * 2020-07-30 2020-10-30 杭州安恒信息技术股份有限公司 Vulnerability data analysis method, system and related device
CN112699373A (en) * 2020-12-24 2021-04-23 山东鲁能软件技术有限公司 Method and device for detecting SQL injection vulnerability in batch

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8631497B1 (en) * 2007-02-01 2014-01-14 Mcafee, Inc. Systems and methods for automating blind detection of computational vulnerabilities
CN103685228A (en) * 2013-10-12 2014-03-26 北京奇虎科技有限公司 Website vulnerability rapid scanning method and device
CN104394197A (en) * 2014-11-07 2015-03-04 南方电网科学研究院有限责任公司 SQL (Structured Query Language) injection detection system and method based on cloud environment
CN104683328A (en) * 2015-01-29 2015-06-03 兴华永恒(北京)科技有限责任公司 Method and system for scanning cross-site vulnerability

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8631497B1 (en) * 2007-02-01 2014-01-14 Mcafee, Inc. Systems and methods for automating blind detection of computational vulnerabilities
CN103685228A (en) * 2013-10-12 2014-03-26 北京奇虎科技有限公司 Website vulnerability rapid scanning method and device
CN104394197A (en) * 2014-11-07 2015-03-04 南方电网科学研究院有限责任公司 SQL (Structured Query Language) injection detection system and method based on cloud environment
CN104683328A (en) * 2015-01-29 2015-06-03 兴华永恒(北京)科技有限责任公司 Method and system for scanning cross-site vulnerability

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
FORWARDBA: ""Sqlmap批量扫描burpsuite请求日志记录"", 《HTTP://WWW.51TESTING.COM/HTML/07/N-3711507.HTML》 *
LAKE2: ""自研之路:腾讯漏洞扫描系统的十年历程"", 《HTTPS://SECURITY.TENCENT.COM/INDEX.PHP/BLOG/MSG/100》 *
网友: ""我是如何打造一款自动化SQL注入工具的"", 《HTTPS://WWW.FREEBUF.COM/SECTOOL/74445.HTML》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959935A (en) * 2018-06-25 2018-12-07 郑州云海信息技术有限公司 A kind of loophole plug-in unit batch execution method and device
CN108959935B (en) * 2018-06-25 2021-08-20 郑州云海信息技术有限公司 Method and device for batch execution of bug plug-ins
CN111783105A (en) * 2020-07-08 2020-10-16 国家计算机网络与信息安全管理中心 Penetration testing method, device, equipment and storage medium
CN111783105B (en) * 2020-07-08 2024-03-29 国家计算机网络与信息安全管理中心 Penetration test method, device, equipment and storage medium
CN111859401A (en) * 2020-07-30 2020-10-30 杭州安恒信息技术股份有限公司 Vulnerability data analysis method, system and related device
CN112699373A (en) * 2020-12-24 2021-04-23 山东鲁能软件技术有限公司 Method and device for detecting SQL injection vulnerability in batch

Similar Documents

Publication Publication Date Title
CN106789926A (en) Multi-process automatic SQL injection batch scanning tool and method
CN104035867B (en) Application function traversal method of testing based on Android
CN102122265B (en) System and method for verifying computer software test results
CN104200167B (en) Automate penetration testing method and system
CN103186444B (en) A kind of performance test methods, test platform and test machine
CN103237082B (en) Cloud method of testing, system and cloud server
CN102693183A (en) Method and system for realizing automatic software testing
CN108521339B (en) Feedback type node fault processing method and system based on cluster log
CN102521354B (en) Auditing and testing method and auditing and testing device for data base protocol
CN105681126A (en) Automatic test method and system based on protocol interface
CN103942497A (en) Forensics type website vulnerability scanning method and system
CN108632111A (en) Service link monitoring method based on log
CN105426307A (en) Local area network product test resource sharing method and system
CN103368970B (en) A kind of automation safety detection method for network objectives
CN108876291A (en) A kind of enterprise operation data collection system, method and cloud server
CN111258881B (en) Intelligent test system for workflow test
CN109359707B (en) Method and device for processing rock and soil sample information, computer equipment and storage medium
CN104123397A (en) Automatic test device and method for Web page
CN113055408B (en) Network security test integrated device
CN108335724B (en) Automatic generation system for customer service management, laboratory process, quality control and report
CN111949548B (en) Automatic unauthorized penetration testing method and storage device
CN107169016A (en) A kind of application log acquisition method and device
CN104915291B (en) Terminal restarts verification method and system
CN109921945A (en) Shunt method and its device of the request forwarding of no NGINX a kind of in application layer
CN114398028A (en) Task batch processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531