CN107392033A - A kind of Android device Permeation Test System and its automation penetration testing method - Google Patents

A kind of Android device Permeation Test System and its automation penetration testing method Download PDF

Info

Publication number
CN107392033A
CN107392033A CN201710764166.4A CN201710764166A CN107392033A CN 107392033 A CN107392033 A CN 107392033A CN 201710764166 A CN201710764166 A CN 201710764166A CN 107392033 A CN107392033 A CN 107392033A
Authority
CN
China
Prior art keywords
leak
android device
test system
permeation test
android
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710764166.4A
Other languages
Chinese (zh)
Other versions
CN107392033B (en
Inventor
丁莹
范渊
张月明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Anheng Vehicle Network Security Technology Co ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN201710764166.4A priority Critical patent/CN107392033B/en
Publication of CN107392033A publication Critical patent/CN107392033A/en
Application granted granted Critical
Publication of CN107392033B publication Critical patent/CN107392033B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present invention relates to the vulnerability scanning of Android device and security rating technology, it is desirable to provide a kind of Android device Permeation Test System and its automation penetration testing method.This kind of Android device Permeation Test System includes information identification and processing module, Android leak identification module, back-end data analysis module and front end effect display module.Any Android device only needs the Permeation Test System of the data wire connection present invention, you can high-risk current device, middle danger, low danger leak number, equipment safety coefficient, recovery scenario and safety recommendation are obtained in several seconds.The Permeation Test System of the present invention is efficiently, compatibility is high, plug and play, can be performed entirely automatically and export effective and safe analysis result, allows domestic consumer to grasp Android device present situation in several seconds.

Description

A kind of Android device Permeation Test System and its automation penetration testing method
Technical field
The present invention is the vulnerability scanning and security rating technical field on Android device, more particularly to a kind of Android device Permeation Test System and its automation penetration testing method.
Background technology
With the popularization (mobile phone, smart home, Remote, business administration etc.) of Android device, if these Androids are set It is standby privacy leakage or the in real time potential safety hazard such as monitoring to be present, if by attacker's malicious exploitation, then userspersonal information, even Most Android devices can all face security risk.
With the more and more extensive Android device used, everybody also increasingly pays close attention to the safety of Android device in itself, had more Carry out the demand of more Android device security breaches detections.The exploitation of application program can do security audit and scanning for code, peace Tall and erect system can also receive the leak of outside submission and provide patch, and major security firm can also provide all kinds of virus scan instruments, Safety of payment insures.But the above method still can not allow domestic consumer to know Android device sheet except labor intensive and time The safe condition of body, specifically there are which leak, safety coefficient, the safety operation that should be noted, the solution of problem.Lack one Money, for colony of domestic consumer, plug and play, compatibility is high, versatility is good, meets the security sweep instrument of demand.
To sum up, in the prior art the method for penetration testing both for the personnel for having certain technical foundation, or pin Service to customer service safety, lacks a penetration testing system for allowing domestic consumer quickly to learn Android device security status System.And traditional scan mode, from vulnerability mining to vulnerability exploit etc. test need to take a substantial amount of time, be run multiple times, Also need to be manually entered order and carry out penetration testing using the configuration surroundings step by step of different instruments.
The content of the invention
It is a primary object of the present invention to overcome deficiency of the prior art, there is provided one kind can realize plug and play, efficiently Leak existing for display device, and Permeation Test System and its automation penetration testing side of vulnerability database can be automatically updated in realtime Method.In order to solve the above technical problems, the solution of the present invention is:
A kind of Android device Permeation Test System is provided, including information identification and processing module, Android leak identification module, Back-end data analysis module and front end effect display module;
Described information identifies and processing module is used for timed collection and samples newest Android leak, analyze ID, leak classification, Leak title, leak grade, leak description, best repair scheme, detection scheme and user's suggestion for operation field;Pass through ID duplicate removals Insert background data base table (the background data base table of the Permeation Test System), and scanning rule java files corresponding to generation (code for corresponding to scanning rule);
The Android leak identification module is used for the local Hole Detection result (leakage i.e. in Android device of Android device The testing result of hole scanning application;Android device Permeation Test System can install vulnerability scanning application automatically) return to server (server of the Permeation Test System);
The back-end data analysis module is used to receive Android device application program passback file (Android device application program Pass back to the file of the osmosis system server), keyword corresponding to this document is parsed, and extract Lou from background data base table Leak description, recovery scenario and leak score information, export analysis result corresponding to hole;Analysis result includes leak ID, leak Hazard rating, leak coverage, leak influence, leak recovery scenario, leak safety recommendation, the high, normal, basic danger distribution of leak, leakage Hole number and corresponding Android device TOP SCORES information;
The front end effect display module is used to after carrying out information processing to the analysis result of back-end data analysis module open up Show, the content of displaying includes:Equipment leak number (equipment is high-risk, in jeopardize low danger leak number), equipment scoring, safety are built View, and can click on and check leak details.
In the present invention, the front end effect display module, back-end data analysis module is shown with web page in computer end Analysis result, in mobile phone terminal with the analysis result of HTML5 page presentation back-end data analysis modules.
In the present invention, the information processing in the front end effect display module, refers to back-end data analysis module Analysis result, including leak ID, leak harm registration, the influence of leak coverage, leak, leak recovery scenario, leak safety It is recommended that, the distribution of leak high, normal, basic danger, leak number and corresponding Android device TOP SCORES information, it is defeated after being concluded and being arranged Go out for text or form web page.
In the present invention, the database uses MYSQL database.
The automation penetration testing method based on described Android device Permeation Test System of offer, specifically includes following steps Suddenly:
Step 1:After installing Android device Permeation Test System on machine (computer or Raspberry Pi), user need to only beat Opening usb debugging, (usb debugging is the function of being used for development that Android device provides, can be in computer using the function Or between Raspberry Pi and Android device equipment, replicate data is carried out, application program is installed on the mobile apparatus, reads the behaviour such as data Make), it would be desirable to the Android device of scanning is connected on machine by data wire;
Step 2:Android device Permeation Test System can install vulnerability scanning Android application program automatically, and (vulnerability scanning is pacified Tall and erect application program uses the vulnerability scanning Android application program of independent development), the leak for collecting the Android device for needing to scan is believed Breath, returns to the server process of Android device Permeation Test System, server from background data base extract the corresponding description of leak, Recovery scenario and leak score data, match leak and return to analysis result;Analysis result includes leak ID, leak endangers etc. Level, the influence of leak coverage, leak, leak recovery scenario, leak safety recommendation, the high, normal, basic danger distribution of leak, leak number And corresponding Android device TOP SCORES information;
Android device Permeation Test System includes to the Hole Detection item of Android device:Man-machine environment inspection, short message are forged Leak, Remote Code Execution Vulnerability, go-between's information forge leak, go-between's input validation leak, multimedia file serializing Leak, equipment manager leak, message registration go beyond one's commission leak, broadcast around leak, bluetooth Pin codes remote command perform leak, Refusal service, unlocking pin bypass leak, unlocking pin distorts leak, camera carries power leak, input method activation bit is revealed, Monitor carries power leak, message pushes SQL injection leak, memory management resources exhaust leak, leak is restarted in grotesque circulation, Contact person, which goes beyond one's commission, to be created leak, Bluetooth command injection loophole, intersects signature refusal service leak, broadcast component authority around leakage Hole, authentication key leakage leak, startup component carries power leak, Samsung message module code performs leak, Huawei Wifi is refused Absolutely service leak, using exist ad code, component open to the outside world leak, browser address bar cheat leak, mailbox open weight Orient leak, reader code performs leak, Application Certificate verification leak;
Android device Permeation Test System can be automatic on Permeation Test System backstage to the Hole Detection item of Android device Newest leak data on collection network, parse the background data base of the simultaneously real-time update Permeation Test System;
Step 3:The data analysis module output of Android device Permeation Test System:Leak ID, leak hazard rating, leakage Hole coverage, leak influence, leak recovery scenario, the high, normal, basic danger distribution of leak safety recommendation, leak, leak number and right Answer Android device TOP SCORES information;
Step 4:Android device Permeation Test System vulnerability scanning analysis result respectively in Android device application program and Shown on the webpage of machine (computer or Raspberry Pi) connection display, obtain the Permeation Test System vulnerability scanning analysis result After displaying, automatic unloading can be selected to be arranged on the application program in Android device.
In the present invention, root authority of the Android device Permeation Test System without Android device to be scanned.
Compared with prior art, the beneficial effects of the invention are as follows:
Any Android device only needs the Permeation Test System of the data wire connection present invention, you can obtains current device in several seconds High-risk, middle danger, low danger leak number, equipment safety coefficient, recovery scenario and safety recommendation.The Permeation Test System of the present invention is high Effect, compatibility are high, plug and play, can be performed entirely automatically and export effective and safe analysis result, allow in several seconds of domestic consumer Grasp Android device present situation.
Brief description of the drawings
Fig. 1 is the use flow diagram of Android device Permeation Test System.
Fig. 2 is the modules schematic diagram in Android device Permeation Test System.
Fig. 3 is penetration testing schematic flow sheet in embodiment.
Embodiment
It is computer technology in information the present invention relates to information security attacking and defending automatic technology firstly the need of explanation A kind of application of security fields.In the implementation process of the present invention, the application of multiple software function modules can be related to.Applicant Think, such as after application documents, accurate understanding realization principle and goal of the invention of the invention is read over, combining existing public affairs In the case of knowing technology, those skilled in the art can use the software programming technical ability of its grasp to realize the present invention completely.It is foregoing Software function module includes but is not limited to:Information identifies and processing module, Android leak identification module, back-end data analysis module Category this category referred to front end effect display module, all the present patent application files, applicant will not enumerate.
The present invention is described in further detail with embodiment below in conjunction with the accompanying drawings:
Android device Permeation Test System as shown in Figure 2, modules are described in detail as follows:
1st, information identification and processing module
Developed, can be used in different operating system platforms using python.Daily timed collection samples newest Android Leak, analyze ID, leak classification, leak title, leak grade, leak description, detection scheme, best repair scheme and user Suggestion for operation field.Background data base table is inserted by ID duplicate removals.And generate corresponding scanning rule java files.
2nd, Android leak identification module
This module is developed with java, is mounted in the application program at user mobile phone end, by information identification and processing module from The java files of the scanning rule of dynamic generation are added in application item, once user connects data wire and authorizes usb tune Try authority, you can this application program is installed, and with jason format print Hole Detection files, passes back to server.
3rd, back-end data analysis module
This module is developed with java, is received application program passback file, is parsed the output of jason forms, and from database Extract description, recovery scenario and scoring corresponding to leak.Parsing output herein below:(1) leak it is total and high-risk, in jeopardize it is low Danger pie chart;(2) Android device safety coefficient;(3) system vulnerability suggestion is upgraded to the system of secure version, and prompts caution of operation Item.The Apply Names to be upgraded is prompted using leak;(4) leak details button, it can click and enter and check the specific of each leak Ins and outs.Result is returned into mobile phone terminal with HTML form.
4th, front end effect display module
This module is used for the result for showing back-end data analysis module.Computer end shows with web page, mobile phone terminal with HTML5TML5 page presentations.Presentation device is high-risk, in jeopardize low danger leak number, equipment scoring, safety recommendation, and can click on Check leak details.
As shown in figure 1, the automation penetration testing method based on Android device Permeation Test System, is comprised the following steps that:
Step 1:Inventor is after machine upper portion has affixed one's name to leakage location, and user need to only open usb debugging, and plugging needs The Android device to be scanned.
Step 2:Leakage location can install vulnerability scanning apk automatically, collect current device vulnerability information, return to Background process, it can extract Data Matching leak from database automatically from the background and return to scanning result.
Detection includes:Man-machine environment inspection, short message are forged leak, Remote Code Execution Vulnerability, go-between's information and forged Leak, go-between's input validation leak, multimedia file serializing leak, equipment manager leak, message registration go beyond one's commission leak, Broadcast performs leak around leak, bluetooth Pin codes remote command, refusal services, unlocking pin is distorted around leak, unlocking pin Leak, camera propose power leak, the leakage of input method activation bit, monitor carries power leak, message pushes SQL injection leak, interior Deposit management resource exhaustion leak, leak is restarted in grotesque circulation, contact person goes beyond one's commission create leak, Bluetooth command injection loophole, Intersect refusal service leak of signing, broadcast component authority proposes power leakage around leak, authentication key leakage leak, startup component Hole, Samsung message module code perform leak, Huawei Wifi refusal services leak, using ad code, component being present to external-open Put leak, browser address bar deception leak, mailbox opens redirection leak, reader code performs leak, Application Certificate school Test leak etc..
Wherein detected rule can the automatic collection renewal in backstage.
Penetration testing type includes man-machine environment inspection, short message forges leak, Remote Code Execution Vulnerability, go-between's information Leak, go-between's input validation leak, multimedia file serializing leak, equipment manager leak, message registration is forged to go beyond one's commission Leak, broadcast performs leak around leak, bluetooth Pin codes remote command, refusal services, unlocking pin is close around leak, unblock Code distorts leak, camera carries power leak, input method activation bit is revealed, monitor carries power leak, message push SQL injection leakage Hole, memory management resources, which exhaust leak, leak is restarted in grotesque circulation, contact person goes beyond one's commission creates leak, Bluetooth command injection Leak, intersect refusal service leak of signing, broadcast component authority around leak, authentication key leakage leak, startup component Carry power leak, Samsung message module code performs leak, Huawei Wifi refusal services leak, using ad code, component being present Leak, the browser address bar of opening to the outside world cheat leak, mailbox opens and redirects leak, reader code execution leak, application Certificate verifies leak.
Step 3:Only need to can return within several seconds the list of user's leak, equipment safety scoring and leak solution.User is Current device safe condition and solution can be known rapidly in several seconds.
Step 4:Effect is illustrated in equipment application and webpage respectively, and scanning completes that automatic unloading may be selected.
The present invention is more fully understood in the professional and technical personnel that the following examples can make this professional, but not with any side The formula limitation present invention.
Such as the schematic diagram that Fig. 3 is vulnerability scanning flow in one embodiment of the present of invention, step includes:
1) user opens Android device usb debugging authorities, plugs data wire, agrees to usb links;
2) computer installs scanning application program in user's Android;
3) program scanning completes return data to computer;
4) information processing is formatted to result, and form is converted into the visual form of user;
5) from the background with HTML5 form, by displaying feedback of the information to mobile phone;
4) in computer webpage front-end and mobile phone terminal display scan result.
Finally it should be noted that listed above is only specific embodiment of the invention.It is clear that the invention is not restricted to Above example, there can also be many variations.One of ordinary skill in the art can directly lead from present disclosure All deformations for going out or associating, are considered as protection scope of the present invention.

Claims (6)

1. a kind of Android device Permeation Test System, it is characterised in that including information identification and processing module, the identification of Android leak Module, back-end data analysis module and front end effect display module;
Described information identifies and processing module is used for timed collection and samples newest Android leak, analyzes ID, leak classification, leak Title, leak grade, leak description, best repair scheme, detection scheme and user's suggestion for operation field;Inserted by ID duplicate removals Background data base table, and scanning rule java files corresponding to generation;
The Android leak identification module is used to the local Hole Detection result of Android device returning to server;
The back-end data analysis module is used to receive Android device application program passback file, parses crucial corresponding to this document Word, and spring a leak corresponding leak description, recovery scenario and leak score information are extracted from background data base table, output analysis knot Fruit;Analysis result includes leak ID, leak hazard rating, leak coverage, leak influence, leak recovery scenario, leak peace Full suggestion, the high, normal, basic danger distribution of leak, leak number and corresponding Android device TOP SCORES information;
The front end effect display module is used to after carrying out information processing to the analysis result of back-end data analysis module show, opened up The content shown includes:Equipment leak number, equipment scoring, safety recommendation, and can click on and check leak details.
A kind of 2. Android device Permeation Test System according to claim 1, it is characterised in that the front end effect displaying Module, the analysis result of back-end data analysis module is shown with web page in computer end, in mobile phone terminal with HTML5 page presentations The analysis result of back-end data analysis module.
A kind of 3. Android device Permeation Test System according to claim 1, it is characterised in that the front end effect displaying Information processing in module, refer to the analysis result of back-end data analysis module, including leak ID, leak harm registration, leakage Hole coverage, leak influence, leak recovery scenario, the high, normal, basic danger distribution of leak safety recommendation, leak, leak number and right Android device TOP SCORES information is answered, output is text or form web page after being concluded and being arranged.
4. a kind of Android device Permeation Test System according to claim 1, it is characterised in that the database uses MYSQL database.
5. the automation penetration testing method based on the Android device Permeation Test System described in claim 1, it is characterised in that Specifically include following step:
Step 1:After Android device Permeation Test System is installed on machine, usb debugging is opened, it would be desirable to which the Android of scanning is set It is standby to be connected to by data wire on machine;
Step 2:Android device Permeation Test System can install vulnerability scanning Android application program automatically, and collecting needs what is scanned The vulnerability information of Android device, returns to the server process of Android device Permeation Test System, and server is from background data base Leak corresponding description, recovery scenario and leak score data are extracted, leak is matched and returns to analysis result;Analysis result includes leakage Hole ID, leak hazard rating, leak coverage, leak influence, leak recovery scenario, leak safety recommendation, leak are high, normal, basic Danger distribution, leak number and corresponding Android device TOP SCORES information;
Android device Permeation Test System includes to the Hole Detection item of Android device:Man-machine environment inspection, short message forge leak, Remote Code Execution Vulnerability, go-between's information forge leak, go-between's input validation leak, multimedia file serializing leak, Equipment manager leak, message registration go beyond one's commission leak, broadcast around leak, bluetooth Pin codes remote command execution leak, refusal clothes Business, unlocking pin are around leak, unlocking pin distorts leak, camera carries power leak, input method activation bit is revealed, monitor Carry power leak, message pushes SQL injection leak, memory management resources exhaust leak, leak, contact person are restarted in grotesque circulation Go beyond one's commission and create leak, Bluetooth command injection loophole, intersect signature refusal service leak, broadcast component authority around leak, identity Checking key leakage leak, startup component carries power leak, Samsung message module code performs leak, Huawei Wifi refusal services are leaked Hole, using exist ad code, component open to the outside world leak, browser address bar cheat leak, mailbox open redirect leak, Reader code performs leak, Application Certificate verification leak;
Android device Permeation Test System can be in the automatic collection in Permeation Test System backstage to the Hole Detection item of Android device Newest leak data on network, parse the background data base of the simultaneously real-time update Permeation Test System;
Step 3:The data analysis module output of Android device Permeation Test System:Leak ID, leak hazard rating, leak shadow Ring scope, leak influence, leak recovery scenario, leak safety recommendation, the high, normal, basic danger distribution of leak, leak number and corresponding peace Tall and erect equipment TOP SCORES information;
Step 4:Android device Permeation Test System vulnerability scanning analysis result is respectively in Android device application program and machine Connect and shown on the webpage of display, after obtaining Permeation Test System vulnerability scanning analysis result displaying, can select to unload automatically Carry the application program being arranged in Android device.
6. automation penetration testing method according to claim 5, it is characterised in that the Android device penetration testing system Root authority of the system without Android device to be scanned.
CN201710764166.4A 2017-08-30 2017-08-30 Android device penetration test system and automatic penetration test method thereof Active CN107392033B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710764166.4A CN107392033B (en) 2017-08-30 2017-08-30 Android device penetration test system and automatic penetration test method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710764166.4A CN107392033B (en) 2017-08-30 2017-08-30 Android device penetration test system and automatic penetration test method thereof

Publications (2)

Publication Number Publication Date
CN107392033A true CN107392033A (en) 2017-11-24
CN107392033B CN107392033B (en) 2019-12-31

Family

ID=60348679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710764166.4A Active CN107392033B (en) 2017-08-30 2017-08-30 Android device penetration test system and automatic penetration test method thereof

Country Status (1)

Country Link
CN (1) CN107392033B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107766062A (en) * 2017-12-08 2018-03-06 北京小米移动软件有限公司 For installing the method, system and first terminal of software
CN111027074A (en) * 2019-12-05 2020-04-17 国网浙江省电力有限公司电力科学研究院 Vulnerability automatic utilization method and system
CN112887945A (en) * 2021-01-11 2021-06-01 公安部第三研究所 Penetration testing method for Internet of vehicles network

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103227992A (en) * 2013-04-01 2013-07-31 南京理工大学常熟研究院有限公司 Android terminal-based vulnerability scanning system
CN104200167A (en) * 2014-08-05 2014-12-10 杭州安恒信息技术有限公司 Automatic penetration testing method and system
CN105069357A (en) * 2015-08-06 2015-11-18 福建天晴数码有限公司 Vulnerability scanning method, cloud server and system
US20150381650A1 (en) * 2014-05-06 2015-12-31 Synack, Inc. Computer system for distributed discovery of vulnerabilities in applications
CN105930273A (en) * 2016-05-04 2016-09-07 云南电网有限责任公司信息中心 Mobile application automation security testing platform
CN106921731A (en) * 2017-01-24 2017-07-04 北京奇虎科技有限公司 Leak restorative procedure and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103227992A (en) * 2013-04-01 2013-07-31 南京理工大学常熟研究院有限公司 Android terminal-based vulnerability scanning system
US20150381650A1 (en) * 2014-05-06 2015-12-31 Synack, Inc. Computer system for distributed discovery of vulnerabilities in applications
CN104200167A (en) * 2014-08-05 2014-12-10 杭州安恒信息技术有限公司 Automatic penetration testing method and system
CN105069357A (en) * 2015-08-06 2015-11-18 福建天晴数码有限公司 Vulnerability scanning method, cloud server and system
CN105930273A (en) * 2016-05-04 2016-09-07 云南电网有限责任公司信息中心 Mobile application automation security testing platform
CN106921731A (en) * 2017-01-24 2017-07-04 北京奇虎科技有限公司 Leak restorative procedure and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107766062A (en) * 2017-12-08 2018-03-06 北京小米移动软件有限公司 For installing the method, system and first terminal of software
CN111027074A (en) * 2019-12-05 2020-04-17 国网浙江省电力有限公司电力科学研究院 Vulnerability automatic utilization method and system
CN111027074B (en) * 2019-12-05 2022-03-15 国网浙江省电力有限公司电力科学研究院 Vulnerability automatic utilization method and system
CN112887945A (en) * 2021-01-11 2021-06-01 公安部第三研究所 Penetration testing method for Internet of vehicles network
CN112887945B (en) * 2021-01-11 2022-12-09 公安部第三研究所 Penetration testing method for Internet of vehicles network

Also Published As

Publication number Publication date
CN107392033B (en) 2019-12-31

Similar Documents

Publication Publication Date Title
CN104767757B (en) Various dimensions safety monitoring method and system based on WEB service
CN109325351A (en) A kind of security breaches automatic Verification systems based on many survey platforms
CN102468985B (en) The method and system of penetration testing is carried out for Network Security Device
CN104283885B (en) A kind of implementation method of many SP secure bindings based on intelligent terminal local authentication
US20120324582A1 (en) Service system that diagnoses the vulnerability of a web service in real time mode and provides the result information thereof
US20150256556A1 (en) Method and system for web integrity validator
CN109871696A (en) A kind of automatic collection and vulnerability scanning system and method, computer of vulnerability information
US11403633B2 (en) Method for sending digital information
Yang et al. Security analysis of third-party in-app payment in mobile applications
CN107392033A (en) A kind of Android device Permeation Test System and its automation penetration testing method
CN104363236A (en) Automatic vulnerability validation method
CN104580230B (en) Verification method and device are attacked in website
CN111884989B (en) Vulnerability detection method and system for electric power web system
CN101950337A (en) System and method for monitoring website truthful data
CN105975863A (en) Method for evaluating and calculating information security risk of power distribution automation terminal equipment
CN104539624A (en) Safety monitoring method and device for number information in text
CN106713321A (en) Authority management method and device for debugging function of point of sale
CN107786573A (en) A kind of data verification system
CN106407813A (en) Data normalization processing apparatus and method for heterogeneous vulnerability scanner
CN106572082A (en) Approval signature verifying method, mobile device, terminal device and system
CN106559419A (en) The application and identification method and identification terminal of short message verification code
CN112818352B (en) Database detection method and device, storage medium and electronic device
CN105703908A (en) Verification code input method and verification code input device
CN108540491B (en) Semi-automatic penetration testing system and method based on passive scanning
CN106713362A (en) Method for realizing security investigation of WiFi network access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 310051 No. 188 Lianhui Street, Xixing Street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Dbappsecurity Co.,Ltd.

Address before: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310051 and 15 layer

Applicant before: Dbappsecurity Co.,ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220908

Address after: Room 709, 7th Floor, No. 188, Lianhui Street, Xixing Street, Binjiang District, Hangzhou City, Zhejiang Province 310000

Patentee after: Hangzhou Anheng Vehicle Network Security Technology Co.,Ltd.

Address before: No. 188, Lianhui street, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Dbappsecurity Co.,Ltd.