CN109499071A - A kind of test method and device detecting game server protocol security - Google Patents

A kind of test method and device detecting game server protocol security Download PDF

Info

Publication number
CN109499071A
CN109499071A CN201811484639.6A CN201811484639A CN109499071A CN 109499071 A CN109499071 A CN 109499071A CN 201811484639 A CN201811484639 A CN 201811484639A CN 109499071 A CN109499071 A CN 109499071A
Authority
CN
China
Prior art keywords
data
game
protocol
game server
encrypted source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811484639.6A
Other languages
Chinese (zh)
Inventor
廖泉辉
周诚
张治良
赖炳新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Xishan Mobile Game Technology Co Ltd
Zhuhai Kingsoft Online Game Technology Co Ltd
Original Assignee
Zhuhai Xishan Mobile Game Technology Co Ltd
Zhuhai Kingsoft Online Game Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Xishan Mobile Game Technology Co Ltd, Zhuhai Kingsoft Online Game Technology Co Ltd filed Critical Zhuhai Xishan Mobile Game Technology Co Ltd
Priority to CN201811484639.6A priority Critical patent/CN109499071A/en
Publication of CN109499071A publication Critical patent/CN109499071A/en
Pending legal-status Critical Current

Links

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/71Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/77Game security or game management aspects involving data related to game devices or game servers, e.g. configuration data, software version or amount of memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Debugging And Monitoring (AREA)
  • Computer And Data Communications (AREA)

Abstract

This application discloses a kind of test methods for detecting game server protocol security, comprising: port specified by game client is monitored, to capture the first game encrypted source data that client is transmitted by the port;According to preset Encryption decryption algorithm, decrypting the game encrypted source data is source binary data;It is plaintext protocol data according to the clear data representation of agreement, to show and edit plaintext protocol data;Encrypting edited plaintext protocol data again is the second game encrypted source data, and encrypted second game encrypted source data is sent to game server.Disclosed herein as well is the test devices of corresponding detection game server protocol security.The application's has the beneficial effect that by capturing game server data structure, analyzes agreement data structure, final support mutually turns various binary structure volume datas and in plain text, can rapidly debug the effect of game server protocol safety.

Description

A kind of test method and device detecting game server protocol security
Technical field
The present invention relates to internet area more particularly to a kind of test methods and dress for detecting game server protocol security It sets.
Background technique
With the universal and development of mobile Internet and mobile Internet, online game is more and more by netizens' Like, is that purpose group sets up one after another with profit, so that occurring on the market thereupon by some by technical staff's establishment More and more plug-in, auxiliary tools etc. are for users to use.These plug-in or auxiliary tools usually utilize game client or Loophole on person's game server modifies game data using improper means.This makes for game server, exists more Carry out the safety problems such as more easy destruction under attack.And how can effectively and rapidly detect game server and game client The potential logical problem at end gives game item and provides the verifying recurrence of most intuitive problem replay method and loophole, just becomes It is very valuable.
For the security test of online game, a kind of more convenient quick way is to game client and game garment Transport protocol between business device carries out distorting debugging.The currently used mainstream scheme of the developer of online game or operator is State decompiling game client code, then artificial search and locate arrives correlation function code position, then modifies institute's location code Function (such as some preconditions limitation remove), need the modified code of Complied executing, also finally to realize to association View source data is distorted.
Above scheme distorts agreement source data by way of modifying game client code, to debug game client Safety to game server access.However this scheme proposes higher technical threshold to tester, and does not do Method is directed to specific game item in a short period of time and provides service.
Summary of the invention
The purpose of the application is to solve the deficiencies in the prior art, provides a kind of test for detecting game server protocol security Method and device can obtain and quickly provide the effect of debugging game server protocol safety.
To achieve the goals above, the following technical solution is employed by the application.
Firstly, the application proposes a kind of test method for detecting game server protocol security, comprising the following steps:
S100 port specified by game client is monitored) to capture the first game that client is transmitted by the port Encrypted source data;
S200) according to preset Encryption decryption algorithm, decrypting the game encrypted source data is source binary data;
It S300 is) plaintext protocol data according to the clear data representation of agreement, to show and edit plaintext agreement number According to;
S400) encrypting edited plaintext protocol data again is the second game encrypted source data, and by encrypted the Two game encrypted source datas are sent to game server.
Further, in the above method of the application, which is JSON clear data structure.
Still further, the JSON clear data structure includes at least protocol number, type in the above method of the application And numerical value.
Further, in the above method of the application, which is shown with tree form.
Further, in the above method of the application, step S300 is further comprising the steps of:
S301 it) interrupts to game server the second game encrypted source data;
S302) the plaintext protocol data specified according to protocol number retrieval;
S303 the data of the protocol number) are directly modified, or cover the data of the protocol number automatically using predefined value.
Further, in the above method of the application, step S400 is further comprising the steps of:
S401 it) searches in the plaintext protocol data edited by the numerical value and type of modification data;
S402 it) according to resulting type is searched, generates by the binary data packets of modification data;
S403 binary data packets delivery value game server generated) is sent.
Still further, the second game encrypted source data is sent by continuous several times in the above method of the application, or Pause sends the mode sent again after data to be modified, is sent to game server.
Secondly, the application also proposes a kind of test device for detecting game server protocol security, comprise the following modules: prison Module is listened, for monitoring port specified by game client, is added with capturing client by the first game that the port is transmitted Close source data;Deciphering module is source binary system for according to preset Encryption decryption algorithm, decrypting the game encrypted source data Data;Debugging module is plaintext protocol data for the clear data representation according to agreement, is assisted in plain text with showing and editing Discuss data;Encrypting module is the second game encrypted source data for encrypting edited plaintext protocol data again, and will encryption The second game encrypted source data afterwards is sent to game server.
Further, in the above-mentioned apparatus of the application, which is JSON clear data structure.
Still further, the JSON clear data structure includes at least protocol number, type in the above-mentioned apparatus of the application And numerical value.
Further, in the above-mentioned apparatus of the application, which is shown with tree form.
Further, in the above-mentioned apparatus of the application, which further includes following submodule: interrupt module, is used In interrupting to game server the second game encrypted source data;Retrieval module, it is bright for being specified according to protocol number retrieval Literary protocol data;Editor module for directly modifying the data of the protocol number, or covers the protocol number using predefined value automatically Data.
Further, in the above-mentioned apparatus of the application, which further includes following submodule: searching module, is used By the numerical value and type of modification data in the plaintext protocol data that lookup has been edited;Packetization module, for according to lookup gained Type, generate by the binary data packets of modification data;Sending module, for sending binary data packets transmission generated It is worth game server.
Still further, the second game encrypted source data is sent by continuous several times in the above-mentioned apparatus of the application, or Pause sends the mode sent again after data to be modified, is sent to game server.
Finally, the application also proposes a kind of computer readable storage medium, it is stored thereon with computer instruction.Above-metioned instruction When being executed by processor, following steps are executed:
S100 port specified by game client is monitored) to capture the first game that client is transmitted by the port Encrypted source data;
S200) according to preset Encryption decryption algorithm, decrypting the game encrypted source data is source binary data;
It S300 is) plaintext protocol data according to the clear data representation of agreement, to show and edit plaintext agreement number According to;
S400) encrypting edited plaintext protocol data again is the second game encrypted source data, and by encrypted the Two game encrypted source datas are sent to game server.
Further, when processor executes above-metioned instruction, which is JSON clear data structure.
Still further, the JSON clear data structure includes at least protocol number, class when processor executes above-metioned instruction Type and numerical value.
Further, when processor executes above-metioned instruction, which is shown with tree form.
Further, when processor executes above-metioned instruction, step S300 is further comprising the steps of:
S301 it) interrupts to game server the second game encrypted source data;
S302) the plaintext protocol data specified according to protocol number retrieval;
S303 the data of the protocol number) are directly modified, or cover the data of the protocol number automatically using predefined value.
Further, when processor executes above-metioned instruction, step S400 is further comprising the steps of:
S401 it) searches in the plaintext protocol data edited by the numerical value and type of modification data;
S402 it) according to resulting type is searched, generates by the binary data packets of modification data;
S403 binary data packets delivery value game server generated) is sent.
The application's has the beneficial effect that by capturing game server data structure, divides agreement data structure Analysis, it is final to support mutually to turn various binary structure volume datas and in plain text, it can rapidly debug game server protocol security The effect of property.
Detailed description of the invention
Fig. 1 show the flow chart of the test method of detection game server protocol security disclosed in the present application;
Fig. 2 show the network structure configuration diagram for realizing method shown in Fig. 1;
Fig. 3 is shown in one embodiment of the application, the method flow diagram of display and editor's plaintext protocol data;
Fig. 4 is shown in another embodiment of the application, the method for encrypting and transmitting the second game encrypted source data Flow chart;
Fig. 5 show the function structure chart of the test device of detection game server protocol security disclosed in the present application.
Specific embodiment
It is carried out below with reference to technical effect of the embodiment and attached drawing to the design of the application, specific structure and generation clear Chu, complete description, to be completely understood by the purpose, scheme and effect of the application.It should be noted that the case where not conflicting Under, the features in the embodiments and the embodiments of the present application can be combined with each other.
It should be noted that unless otherwise specified, when a certain feature referred to as " fixation ", " connection " are in another feature, It can directly fix, be connected to another feature, and can also fix, be connected to another feature indirectly.In addition, this The descriptions such as upper and lower, left and right used in application are only the mutual alignment pass relative to each component part of the application in attached drawing For system.In the application and the "an" of singular used in the attached claims, " described " and "the" also purport It is including most forms, unless the context clearly indicates other meaning.
In addition, unless otherwise defined, the technology of all technical and scientific terms used herein and the art The normally understood meaning of personnel is identical.Term used in the description is intended merely to description specific embodiment herein, without It is to limit the application.Term as used herein "and/or" includes the arbitrary of one or more relevant listed items Combination.
It will be appreciated that though various elements may be described in this application using term first, second, third, etc., but These elements should not necessarily be limited by these terms.These terms are only used to for same type of element being distinguished from each other out.For example, not taking off In the case where the application range, first element can also be referred to as second element, and similarly, second element can also be referred to as First element.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When ".
Method flow diagram shown in referring to Fig.1, in one or more embodiments of the application, the disclosure as set forth herein inspection Survey the test method of game server protocol security, comprising the following steps:
S100 port specified by game client is monitored) to capture the first game that client is transmitted by the port Encrypted source data;
S200) according to preset Encryption decryption algorithm, decrypting the game encrypted source data is source binary data;
It S300 is) plaintext protocol data according to the clear data representation of agreement, to show and edit plaintext agreement number According to;
S400) encrypting edited plaintext protocol data again is the second game encrypted source data, and by encrypted the Two game encrypted source datas are sent to game server.
Specifically, referring to network structure shown in Fig. 2, the tester of online game passes through a variety of different types of trips Play client is connected to game server, and by the way that monitor is arranged between each game client and game server, with prison Listen the first game encrypted source data transmitted on designated port.Due to the test method be network-oriented game developer and Tester's, therefore the assembling mode of Game Protocol and for guaranteeing that the Encryption decryption algorithm of data of network game safety can To obtain easily.Assembling mode and Encryption decryption algorithm based on above-mentioned Game Protocol, can realize game client respectively Client_Pack interface and Client_Unpack interface, packing and unpacking is carried out to data to be sent, and is encrypted as First game encrypted source data.Correspondingly, similar Server_Pack interface and Server_ also may be implemented in game server Unpack interface, the second game encrypted source data decryption that will be received, and carry out packing and unpacking.In addition, this field skill Art personnel will be appreciated that the number and shape of the display element in attached drawing are only as illustrative reference, not as to the present invention Limitation.
In the said one or multiple embodiments of the application, which is JSON clear data structure.This When, JSON clear data structure can realize the mutual conversion with source binary data by the interface of above-mentioned offer.It is converted to After the binary data of source, the first game encrypted source data or the second game encrypted source number are encrypted as by specified Encryption Algorithm According to.Further, in the said one of the application or multiple embodiments, which includes at least agreement Number, type and numerical value.Specifically, it can be assembled with flowering structure
{ proto (protocol number)+data (data), data (structure): type+value }
To which basic information preparation is carried out in the mutual conversion between JSON clear data and corresponding binary structure.Again into One step, above-mentioned clear data structure can realize that common data structure is (especially above-mentioned in conjunction with TreeView display format JSON clear data structure) display, easily to search and modify the data of any position.
Referring to submethod flow chart shown in Fig. 3, in one or more embodiments of the application, step S300 is also wrapped Include following sub-step:
S301 it) interrupts to game server the second game encrypted source data;
S302) the plaintext protocol data specified according to protocol number retrieval;
S303 the data of the protocol number) are directly modified, or cover the data of the protocol number automatically using predefined value.
Specifically, developer or tester can be directed to specific protocol number, preset corresponding predefined value and carry out Test.At this point, predefined value can be the baseline of test, for being directed to each iteration version of online game, by predefined The automatic covering of value, to realize the regression test of current version automatically.Meanwhile for specific protocol number, developer or Tester can receive carry out edit-modify by way of breakpoint, to detect indicating for game client and game server Whether logic meets expection.Alternatively, can directly refer to game client transmission in one or more embodiments of the application Enable, screenshotss going game client and on be stored in specified test file folder.Those skilled in the art can swim according to network Specific structure frame, writes corresponding graphical interfaces or text interface debugging tool, the application refuses this used by playing It limits.
Referring to submethod flow chart shown in Fig. 4, in one or more embodiments of the application, step S400 is also wrapped Include following sub-step:
S401 it) searches in the plaintext protocol data edited by the numerical value and type of modification data;
S402 it) according to resulting type is searched, generates by the binary data packets of modification data;
S403 binary data packets delivery value game server generated) is sent.
Specifically, due to the first game encrypted source data and the second game encrypted source number by modification data relative to transmission According to smaller, and the data are only used for close beta;Therefore it will be packaged according to its type by modification data, formation is modified The binary data packets of data, and binary data packets generated are directly transmitted to game server, to improve debugging Efficiency.For the ease of to the above-mentioned binary data packets of game server, in one or more embodiments of the application, Two game encrypted source datas are sent by continuous several times, or pause sends the mode sent again after data to be modified, is sent to Game server.
Function structure chart referring to Figure 5, in one or more embodiments of the application, the disclosure as set forth herein inspection The test device for surveying game server protocol security comprises the following modules: module is monitored, for monitoring specified by game client Port, to capture the first game encrypted source data that client is transmitted by the port;Deciphering module, for according to preset Encryption decryption algorithm, decrypting the game encrypted source data is source binary data;Debugging module, for the plaintext according to agreement Data structure is expressed as plaintext protocol data, to show and edit plaintext protocol data;Encrypting module, for encryption editor again Plaintext protocol data afterwards is the second game encrypted source data, and encrypted second game encrypted source data is sent to game Server.Specifically, referring to network structure shown in Fig. 2, the tester of online game passes through a variety of different types of trips Play client is connected to game server, and by the way that monitor is arranged between each game client and game server, with prison Listen the first game encrypted source data transmitted on designated port.Due to the test method be network-oriented game developer and Tester's, therefore the assembling mode of Game Protocol and for guaranteeing that the Encryption decryption algorithm of data of network game safety can To obtain easily.Assembling mode and Encryption decryption algorithm based on above-mentioned Game Protocol, can realize game client respectively Client_Pack interface and Client_Unpack interface, packing and unpacking is carried out to data to be sent, and is encrypted as First game encrypted source data.Correspondingly, similar Server_Pack interface and Server_ also may be implemented in game server Unpack interface, the second game encrypted source data decryption that will be received, and carry out packing and unpacking.In addition, this field skill Art personnel will be appreciated that the number and shape of the display element in attached drawing are only as illustrative reference, not as to the present invention Limitation.
In the said one or multiple embodiments of the application, which is JSON clear data structure.This When, JSON clear data structure can realize the mutual conversion with source binary data by the interface of above-mentioned offer.It is converted to After the binary data of source, the first game encrypted source data or the second game encrypted source number are encrypted as by specified Encryption Algorithm According to.Further, in the said one of the application or multiple embodiments, which includes at least agreement Number, type and numerical value.Specifically, it can be assembled with flowering structure
{ proto (protocol number)+data (data), data (structure): type+value }
To which basic information preparation is carried out in the mutual conversion between JSON clear data and corresponding binary structure.Again into One step, above-mentioned clear data structure can realize that common data structure is (especially above-mentioned in conjunction with TreeView display format JSON clear data structure) display, easily to search and modify the data of any position.
In one or more embodiments of the application, which further includes following submodule: interrupt module is used for It interrupts to game server the second game encrypted source data;Retrieval module, for the plaintext specified according to protocol number retrieval Protocol data;Editor module covers the protocol number for directly modifying the data of the protocol number, or using predefined value automatically Data.Specifically, developer or tester can be directed to specific protocol number, preset corresponding predefined value and surveyed Examination.At this point, predefined value can be the baseline of test, for being directed to each iteration version of online game, pass through predefined value Automatic covering, thus automatically realize current version regression test.Meanwhile for specific protocol number, developer or survey Examination personnel can receive carry out edit-modify by way of breakpoint, indicate to patrol to detect game client and game server It collects and whether meets expection.Alternatively, can directly send and instruct to game client in one or more embodiments of the application, Screenshotss going game client and on be stored in specified test file folder.Those skilled in the art can be according to online game institute The specific structure frame of use, writes corresponding graphical interfaces or text interface debugging tool, and the application not limits this.
In one or more embodiments of the application, which further includes following submodule: searching module is used for It searches in the plaintext protocol data edited by the numerical value and type of modification data;Packetization module, for resulting according to searching Type is generated by the binary data packets of modification data;Sending module, for sending binary data packets delivery value generated Game server.Specifically, due to being encrypted by modification data relative to the first game encrypted source data of transmission and the second game Source data is smaller, and the data are only used for close beta;Therefore it will be packaged according to its type by modification data, and form quilt The binary data packets of data are modified, and binary data packets generated are directly transmitted to game server, are adjusted with improving The efficiency of examination.For the ease of to the above-mentioned binary data packets of game server, in one or more embodiments of the application In, the second game encrypted source data is sent by continuous several times, or pause sends the mode sent again after data to be modified, hair It is sent to game server.
It should be appreciated that embodiments herein can be by computer hardware, the combination of hardware and software or by depositing The computer instruction in non-transitory computer-readable memory is stored up to be effected or carried out.Standard program can be used in this method Technology-include realized in computer program configured with the non-transitory computer-readable storage media of computer program, wherein Configured in this way storage medium operates computer in a manner of specific and is predefined --- according to retouching in a particular embodiment The method and attached drawing stated.Each program can with the programming language of level process or object-oriented come realize with computer system Communication.However, if desired, the program can be realized with compilation or machine language.Under any circumstance, which can be compiling Or the language explained.In addition, the program can be run on the specific integrated circuit of programming for this purpose.
Further, this method can be realized in being operably coupled to suitable any kind of computing platform, wrap Include but be not limited to PC, mini-computer, main frame, work station, network or distributed computing environment, individual or integrated Computer platform or communicated with charged particle tool or other imaging devices etc..The various aspects of the application can be to deposit The machine readable code on non-transitory storage medium or equipment is stored up to realize no matter be moveable or be integrated to calculating Platform, such as hard disk, optical reading and/or write-in storage medium, RAM, ROM, so that it can be read by programmable calculator, when Storage medium or equipment can be used for configuration and operation computer to execute process described herein when being read by computer.This Outside, machine readable code, or part thereof can be transmitted by wired or wireless network.When such media include combining microprocessor Or when other data processors realization instruction or program of the step above, application as described herein includes that these and other are different The non-transitory computer-readable storage media of type.When being programmed according to methods and techniques described herein, the application is also Including computer itself.
Computer program can be applied to input data to execute function as described herein, to convert input data with life At storing to the output data of nonvolatile memory.Output information can also be applied to one or more output equipments as shown Device.In the application preferred embodiment, the data of conversion indicate physics and tangible object, including the object generated on display Reason and the particular visual of physical objects are described.
Therefore, should be with descriptive sense rather than restrictive sense understands the specification and drawings.However, by apparent It is:, can be to the application in the case where not departing from the broader spirit and scope of the application as described in claims Make various modifications and change.
Other modifications are in spirit herein.Therefore, although disclosed technology may be allowed various modifications and substitution structure It makes, but has shown that in the accompanying drawings and its some embodiments shown in being described in detail above.It will be appreciated, however, that not It is intended to for the application to be confined to disclosed one or more concrete forms;On the contrary, its intention covers such as the appended claims Defined in fall in all modifications, alternative constructions and equivalent in spirit and scope.

Claims (9)

1. a kind of test method for detecting game server protocol security, which comprises the following steps:
S100 port specified by game client) is monitored, is added with capturing client by the first game that the port is transmitted Close source data;
S200) according to preset Encryption decryption algorithm, decrypting the game encrypted source data is source binary data;
It S300 is) plaintext protocol data according to the clear data representation of agreement, to show and edit plaintext protocol data;
S400) encrypting edited plaintext protocol data again is the second game encrypted source data, and encrypted second is swum Play encrypted source data is sent to game server.
2. test method according to claim 1, which is characterized in that the clear data structure is JSON clear data knot Structure.
3. test method according to claim 2, which is characterized in that the JSON clear data structure includes at least agreement Number, type and numerical value.
4. test method according to claim 2 or 3, which is characterized in that the clear data structure is aobvious with tree form Show.
5. test method according to claim 1, which is characterized in that the step S300 is further comprising the steps of:
S301 it) interrupts to game server the second game encrypted source data;
S302) the plaintext protocol data specified according to protocol number retrieval;
S303 the data of the protocol number) are directly modified, or cover the data of the protocol number automatically using predefined value.
6. test method according to claim 1, which is characterized in that the step S400 is further comprising the steps of:
S401 it) searches in the plaintext protocol data edited by the numerical value and type of modification data;
S402 it) according to resulting type is searched, generates by the binary data packets of modification data;
S403 binary data packets delivery value game server generated) is sent.
7. according to the method described in claim 6, it is characterized in that, the second game encrypted source data by continuous several times send, Or pause sends the mode sent again after data to be modified, is sent to game server.
8. a kind of test device for detecting game server protocol security, which is characterized in that comprise the following modules:
Monitor module, for monitoring port specified by game client, with capture that client is transmitted by the port the One game encrypted source data;
Deciphering module, for according to preset Encryption decryption algorithm, decrypting the game encrypted source data to be source binary number According to;
Debugging module is plaintext protocol data for the clear data representation according to agreement, is assisted in plain text with showing and editing Discuss data;
Encrypting module is the second game encrypted source data for encrypting edited plaintext protocol data again, and will be after encryption The second game encrypted source data be sent to game server.
9. a kind of computer readable storage medium, is stored thereon with computer instruction, it is characterised in that the instruction is held by processor The step of method as described in any one of claims 1 to 7 is realized when row.
CN201811484639.6A 2018-12-06 2018-12-06 A kind of test method and device detecting game server protocol security Pending CN109499071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811484639.6A CN109499071A (en) 2018-12-06 2018-12-06 A kind of test method and device detecting game server protocol security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811484639.6A CN109499071A (en) 2018-12-06 2018-12-06 A kind of test method and device detecting game server protocol security

Publications (1)

Publication Number Publication Date
CN109499071A true CN109499071A (en) 2019-03-22

Family

ID=65751698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811484639.6A Pending CN109499071A (en) 2018-12-06 2018-12-06 A kind of test method and device detecting game server protocol security

Country Status (1)

Country Link
CN (1) CN109499071A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112565003A (en) * 2020-11-24 2021-03-26 西安四叶草信息技术有限公司 Communication data testing method and device, storage medium and electronic equipment
CN113630295A (en) * 2021-08-17 2021-11-09 网易(杭州)网络有限公司 Protocol testing method and device
CN113765862A (en) * 2020-06-05 2021-12-07 腾讯科技(成都)有限公司 Method, device and equipment for testing game protocol and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925431A (en) * 2005-08-31 2007-03-07 华为技术有限公司 Method for file host-host protocol service significance testing
KR20120047013A (en) * 2010-11-03 2012-05-11 주식회사 엔씨소프트 Stress test system for online game server based on script and method thereof
CN102868699A (en) * 2012-09-26 2013-01-09 北京联众互动网络股份有限公司 Method and tool for vulnerability detection of server providing data interaction services
CN105429982A (en) * 2015-11-20 2016-03-23 北京畅游天下网络技术有限公司 Method and device for analyzing communication content between client and server
CN105721239A (en) * 2016-01-18 2016-06-29 网易(杭州)网络有限公司 Game test method, device and game system
CN106126423A (en) * 2016-06-27 2016-11-16 华为技术有限公司 The method of testing of game application, Apparatus and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925431A (en) * 2005-08-31 2007-03-07 华为技术有限公司 Method for file host-host protocol service significance testing
KR20120047013A (en) * 2010-11-03 2012-05-11 주식회사 엔씨소프트 Stress test system for online game server based on script and method thereof
CN102868699A (en) * 2012-09-26 2013-01-09 北京联众互动网络股份有限公司 Method and tool for vulnerability detection of server providing data interaction services
CN105429982A (en) * 2015-11-20 2016-03-23 北京畅游天下网络技术有限公司 Method and device for analyzing communication content between client and server
CN105721239A (en) * 2016-01-18 2016-06-29 网易(杭州)网络有限公司 Game test method, device and game system
CN106126423A (en) * 2016-06-27 2016-11-16 华为技术有限公司 The method of testing of game application, Apparatus and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113765862A (en) * 2020-06-05 2021-12-07 腾讯科技(成都)有限公司 Method, device and equipment for testing game protocol and computer readable storage medium
CN113765862B (en) * 2020-06-05 2024-02-09 腾讯科技(成都)有限公司 Game protocol testing method, device, equipment and computer readable storage medium
CN112565003A (en) * 2020-11-24 2021-03-26 西安四叶草信息技术有限公司 Communication data testing method and device, storage medium and electronic equipment
CN112565003B (en) * 2020-11-24 2022-11-22 西安四叶草信息技术有限公司 Communication data testing method and device, storage medium and electronic equipment
CN113630295A (en) * 2021-08-17 2021-11-09 网易(杭州)网络有限公司 Protocol testing method and device
CN113630295B (en) * 2021-08-17 2022-12-06 网易(杭州)网络有限公司 Protocol testing method and device

Similar Documents

Publication Publication Date Title
CN105103147B (en) With work load distributor come the method and system that track
US8656369B2 (en) Tracing flow of data in a distributed computing application
US9697108B2 (en) System, method, and apparatus for automatic recording and replaying of application executions
US10095602B2 (en) Automated code analyzer
CN109499071A (en) A kind of test method and device detecting game server protocol security
CN109344076A (en) A kind of automatic interface testing method and its device based on JMeter and Jenkins
Larsen et al. A flexible system for in situ triggers
BR112015017722B1 (en) PARALLEL TRACKING METHOD AND SYSTEM FOR PERFORMANCE AND DETAIL
CN110390202A (en) For detecting method, apparatus, system, equipment and the medium of service logic loophole
CN109299161A (en) A kind of data selecting method and device
CN109871312A (en) A kind of interface test method, device, equipment and readable storage medium storing program for executing
Hussain et al. Comparative study of android native and flutter app development
Talukder et al. Droidpatrol: a static analysis plugin for secure mobile software development
US10310962B2 (en) Infrastructure rule generation
CN111309589A (en) Code security scanning system and method based on code dynamic analysis
Mohamed et al. Performance and Dependability evaluation of distributed event-based systems: a dynamic code-injection approach
CN114239026A (en) Information desensitization conversion processing method, device, computer equipment and storage medium
Zhang et al. Android encryption database forensic analysis based on static analysis
Chilese et al. One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
JPWO2019224932A1 (en) Security coping ability measurement system, method and program
De Pauw et al. Visual debugging for stream processing applications
CN112052470A (en) Server file protection method and protection system
Kunz et al. Finding risk patterns in cloud system models
CN110516445A (en) Identification method and device for anti-detection malicious code and storage medium
Mostafa et al. Netdroid: Summarizing network behavior of android apps for network code maintenance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190322