CN110162971A - A kind of leak detection method of software project, device, storage medium and server - Google Patents

A kind of leak detection method of software project, device, storage medium and server Download PDF

Info

Publication number
CN110162971A
CN110162971A CN201910294121.4A CN201910294121A CN110162971A CN 110162971 A CN110162971 A CN 110162971A CN 201910294121 A CN201910294121 A CN 201910294121A CN 110162971 A CN110162971 A CN 110162971A
Authority
CN
China
Prior art keywords
software project
information
loophole
attribute information
assets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910294121.4A
Other languages
Chinese (zh)
Inventor
庞妍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN201910294121.4A priority Critical patent/CN110162971A/en
Publication of CN110162971A publication Critical patent/CN110162971A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention relates to field of computer technology, propose leak detection method, device, storage medium and the server of a kind of software project.Software project management system is docked first, obtains the attribute information for being currently at the target software project of hair version state;Then the assets information that the target software project is determined according to the attribute information got carries out vulnerability scanning to the target software project using the vulnerability scanning mode based on plug-in type POC in conjunction with the assets information;Then the loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;Building prompt information is finally accorded with according to the status indication of the loophole, and the prompt information is sent to the software project management system.It is arranged in this way, after scanning the loophole of some software project, system can construct prompt information automatically and the prompt information is sent to software project management system, so that software developer can be notified in time.

Description

A kind of leak detection method of software project, device, storage medium and server
Technical field
The present invention relates to field of computer technology more particularly to a kind of leak detection methods of software project, device, storage Medium and server.
Background technique
The development process of one software project generally includes demand analysis, Outline Design, detailed design, software test, soft Part deliver and check and accept and etc., developer after develop some software project, hair version before, need the software project It submits to tester to test, relevant code is sent to software post staff again after passing through by test, executes software hair The work such as cloth.Currently, when tester has found that software project there are when loophole, mainly notifies exploit person by modes such as mails Member.However, inefficiency in this way, can not in time be tracked the loophole of software project, loophole is easy to cause to repair The problems such as exceeding the time limit again.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of leak detection method of software project, device, storage medium and Server can in time be tracked the loophole of software, avoid the problem that generating loophole reparation exceeds the time limit.
The embodiment of the present invention in a first aspect, providing a kind of leak detection method of software project, comprising:
Software project management system is docked, the attribute information for being currently at the target software project of hair version state, institute are obtained Software project management system is stated for recording and managing the flow state and attribute information of each software project;
Determine the assets information of the target software project according to the attribute information got, the assets information be with it is soft The information of the hardware of part item association, component and Service Source;
In conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the target software project into Row vulnerability scanning;
The loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;
Building prompt information is accorded with according to the status indication of the loophole, and the prompt information is sent to the software item Mesh management system.
The second aspect of the embodiment of the present invention provides a kind of Hole Detection device of software project, comprising:
Attribute information obtains module, for docking software project management system, obtains the target for being currently at hair version state The attribute information of software project, the software project management system be used for record and manage each software project flow state and Attribute information;
Assets information determining module, for determining the assets letter of the target software project according to the attribute information got Breath, the assets information are the information with the associated hardware of software project, component and Service Source;
Vulnerability scanning module is used in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to institute It states target software project and carries out vulnerability scanning;
Loophole memory module is distributed for the loophole scanned to be stored in preset database, and for the loophole Status indication symbol;
Prompt information sending module for according with building prompt information according to the status indication of the loophole, and is mentioned described Show that information is sent to the software project management system.
The third aspect of the embodiment of the present invention, provides a kind of computer readable storage medium, described computer-readable to deposit Storage media is stored with computer-readable instruction, and such as the embodiment of the present invention is realized when the computer-readable instruction is executed by processor First aspect propose software project leak detection method the step of.
The fourth aspect of the embodiment of the present invention, provides a kind of server, including memory, processor and is stored in institute The computer-readable instruction that can be run in memory and on the processor is stated, the processor executes described computer-readable The step of leak detection method for the software project that the first aspect such as the embodiment of the present invention proposes is realized when instruction.
The leak detection method of software project proposed by the present invention, first docking software project management system, obtain current The attribute information of target software project in hair version state;Then the target software is determined according to the attribute information got The assets information of project, in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the target software Project carries out vulnerability scanning;Then the loophole scanned is stored in preset database, and distributes state for the loophole Marker character;Building prompt information is finally accorded with according to the status indication of the loophole, and the prompt information is sent to described soft Part project management system.It is arranged in this way, after scanning the loophole of some software project, system can be constructed automatically and be mentioned Show information and the prompt information is sent to software project management system (system is software developer system used in everyday System) so that software developer can be notified in time, the loophole of software project is tracked, avoids generating leakage Repair the problem of exceeding the time limit in hole.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is a kind of process of one embodiment of the leak detection method of software project provided in an embodiment of the present invention Figure;
Fig. 2 is a kind of process of second embodiment of the leak detection method of software project provided in an embodiment of the present invention Figure;
Fig. 3 is a kind of structure of one embodiment of the Hole Detection device of software project provided in an embodiment of the present invention Figure;
Fig. 4 is a kind of schematic diagram of server provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides a kind of leak detection method of software project, device, storage medium and server, energy It is enough that the loophole of software is tracked in time, avoid the problem that generating loophole reparation exceeds the time limit.
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field Those of ordinary skill's all other embodiment obtained without making creative work, belongs to protection of the present invention Range.
Referring to Fig. 1, a kind of one embodiment of the leak detection method of software project includes: in the embodiment of the present invention
101, software project management system is docked, the attribute letter for the target software project for being currently at hair version state is obtained Breath;
Firstly, docking software project management system, obtains the attribute letter for the target software project for being currently at hair version state Breath.Software project management system is software developer's operation system used in everyday, for recording and managing each software item Purpose flow state and attribute information.For example, record the project name of each software project, project number, project be responsible for team, Project is presently in the attribute informations such as the store path of state, the project cycle, item code.Specifically, the application can be in clothes Business device end constructs a software project and mentions examining system, and the system is mutually right by calling the api interface of software project management system It connects, to obtain the attribute information of target software project.
102, the assets information of the target software project is determined according to the attribute information got;
After the attribute information for obtaining the target software project for being currently at hair version state, believed according to the attribute got Breath determines the assets information of the target software project.Assets information be and the associated hardware of software project, component and service The information of resource, such as the information such as type of server, type of database and middleware type that software project uses.
103, in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the target software item Mesh carries out vulnerability scanning;
Then, in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the target software item Mesh carries out vulnerability scanning.Poc testing, i.e. Proof of Concept are the verifyings for client's concrete application of industry prevalence Property test, according to user to using system propose performance requirement and extension demand index, carried out on the server of selection The operation of truthful data carries out practical measuring and calculating to carrying amount of user data and runing time, and is extended according to user's future services Demand increase data volume to verify the bearing capacity and performance change of system and platform.
When scanning loophole, the library POC is loaded first, which stores pre-designed each test case;Then The test case in the library POC is chosen in conjunction with assets information;Finally the target software project is carried out using the test case chosen Test, to determine existing loophole.The library POC stores a large amount of test case, using all test cases to the target software It is unpractical that project, which carries out test, therefore exploitation environment locating for target software project can be determined according to the assets information, from And it filters out most suitable a part of test case and is tested.
Further, it when carrying out vulnerability scanning, can be combined with commercial scanner, that is, call existing vulnerability scanning work Tool carries out vulnerability scanning to the target software project.Specifically, can be used AMVS, APPScan to the target software project into The scanning of row black box carries out whitepack scanning to the target software item destination code using Fortify.
104, the loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;
After scanning obtains the loophole of target software project, these loopholes are stored in preset database, and are this A little loophole distribution status indication symbols.Specifically, the state of loophole may include wait check, it is to be confirmed, statement in, ignored, repaired In multiple, wait the states such as check, be turned off, distinguished with status indication symbol.
105, building prompt information is accorded with according to the status indication of the loophole, and the prompt information is sent to described soft Part project management system.
System can accord with building prompt information according to the status indication of the loophole, and the prompt information is sent to described soft Part project management system, with information code, developer pays attention to.For example, if software project scanning discovery is to be checked there are one Loophole can then construct prompt information " XX software project has loophole to be checked, and please checks in time ", be sent to software project Management system.
Further, after the loophole scanned is stored in preset database, can also include:
(1) menace level of the loophole is inquired from the loophole grade table of comparisons constructed in advance;
(2) the reparation time limit of the loophole is determined according to the menace level of the loophole;
(3) the reparation time limit is added in the prompt information.
The loophole grade table of comparisons records the menace level of various types loophole, such as seriously, generally, slightly, according to scanning To the menace level of loophole determine that reparation time limit of the loophole, menace level more high then corresponding reparation time limit are tighter.True After the reparation time limit for determining loophole, which is added in the prompt information, to remind developer to pay attention in time Repair the loophole.
The leak detection method for the software project that the embodiment of the present invention proposes, first docking software project management system, are obtained Take the attribute information for being currently at the target software project of hair version state;Then the mesh is determined according to the attribute information got The assets information for marking software project, in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the mesh It marks software project and carries out vulnerability scanning;Then the loophole scanned is stored in preset database, and is the loophole point It is accorded with status indication;Building prompt information is finally accorded with according to the status indication of the loophole, and the prompt information is sent to The software project management system.It is arranged in this way, after scanning the loophole of some software project, system can be automatic The prompt information is simultaneously sent to software project management system (system is software developer's routine use by building prompt information System), so that software developer can be notified in time, the loophole of software project is tracked, avoids producing The problem of raw loophole reparation is exceeded the time limit.
Referring to Fig. 2, a kind of second embodiment of the leak detection method of software project includes: in the embodiment of the present invention
201, software project management system is docked, the attribute letter for the target software project for being currently at hair version state is obtained Breath;
Step 201 is identical as step 101, specifically can refer to the related description of step 101.
202, according to the determining all operation systems with the target software item association of the attribute information got;
After the attribute information for obtaining the target software project for being currently at hair version state, believed according to the attribute got The determining all operation systems with the target software item association of breath.Specifically, can be by the correlation of associated operation system Information is recorded in the attribute information of software project.
203, using the IP address of server locating for operation system described in nmap tool detection and web page browsing port numbers;
Then, using the IP address of server locating for operation system described in nmap tool detection and web page browsing port numbers. Nmap is a network connection end scanning software, and there are three basic functions, first is that whether one group of host of detection is online;Followed by Scan host port, network service provided by sniff;It may also be inferred that operating system used in host.Specifically, can open Dynamic nmap multi-process detects 80,443 services on icmp packet and basis using nmap-sn, then scanning port and service hair It is existing.
204, the address url that the operation system accessed is crawled using web crawlers;
Next the address url that the operation system accessed is crawled using web crawlers, it is preferable to use based on ghost spider The crawler strategy of spider algorithm, a server limit a main domain and climb 15 layers, and 1,400,000 links can be completed within 2 hours Crawl task.
205, the attribute information of the operation system is obtained;
In addition, it is also necessary to obtain the attribute information of the operation system, such as operation system deployment server type, The type and version of the database of use, the subsystem title for including, the middleware names of use and version, the open source of use are soft The title and version of part, running environment type, HA type and DNS information etc., the attribute information of these operation systems be usually by The artificial preparatory input system of O&M person liable or Asset Mgmt Dept.
206, the attribute information of the IP address, web page browsing port numbers, the address url and operation system is integrated into assets Information list;
Then, the attribute information of the IP address, web page browsing port numbers, the address url and operation system is integrated into money Information list is produced, is stored in specified data library.
207, the library POC is loaded, the library POC stores pre-designed each test case;
When executing vulnerability scanning, the library POC is loaded first, which stores pre-designed each test Use-case.
208, the assets information in the assets information list is read;
Then, the assets information list is searched from specified database, reads assets information therein.
209, target detection use-case is chosen from the library POC according to the assets information read;
Then, target detection use-case is chosen from the library POC according to the assets information read.
Specifically, step 209 may include:
(1) according to the attribute information of the operation system read, issuable loophole type is determined;
(2) test case for detecting the loophole of the loophole type is chosen from the library POC, as the target Test case.
Such as, it is known that after middleware type and version, the middleware type and version that are determined due to some there may be Loophole be known, therefore the test case for detecting the loophole can be chosen from the library POC.Similar, it is known that number After the type and version in library, database loophole that may be present is also known, therefore can be chosen and be used for from the library POC Detect the test case of the type and edition data library relevant vulnerability.Type of server, the title of the open source software tool of use The same procedure that can be used same as version chooses test case.
210, the target software project is tested using the target detection use-case, to determine existing loophole;
After choosing target detection use-case, the target software project is tested using these test cases, with Determine existing loophole.During implementation of test cases, need using the IP address into assets information, web page browsing end The information such as slogan and the address url.
211, the loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;
212, building prompt information is accorded with according to the status indication of the loophole, and the prompt information is sent to described soft Part project management system.
Step 211-212 is identical as step 104-105, specifically can refer to the related description of step 104-105.
The leak detection method for the software project that the embodiment of the present invention proposes, first docking software project management system, are obtained Take the attribute information for being currently at the target software project of hair version state;Then the mesh is determined according to the attribute information got The assets information for marking software project, in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the mesh It marks software project and carries out vulnerability scanning;Then the loophole scanned is stored in preset database, and is the loophole point It is accorded with status indication;Building prompt information is finally accorded with according to the status indication of the loophole, and the prompt information is sent to The software project management system.Compared with one embodiment of the invention, the present embodiment proposes a kind of specific determination The mode of assets information, and the specific mode that POC vulnerability scanning is carried out in conjunction with assets information.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
A kind of leak detection method of software project is essentially described above, a kind of loophole of software project will be examined below Device is surveyed to be described in detail.
Referring to Fig. 3, a kind of one embodiment of the Hole Detection device of software project includes: in the embodiment of the present invention
Attribute information obtains module 301, for docking software project management system, obtains the mesh for being currently at hair version state The attribute information of software project is marked, the software project management system is used to record and manage the flow state of each software project And attribute information;
Assets information determining module 302, for determining the money of the target software project according to the attribute information got Information is produced, the assets information is the information with the associated hardware of software project, component and Service Source;
Vulnerability scanning module 303, for using the vulnerability scanning mode based on plug-in type POC in conjunction with the assets information Vulnerability scanning is carried out to the target software project;
Loophole memory module 304 for the loophole scanned to be stored in preset database, and is the loophole point It is accorded with status indication;
Prompt information sending module 305, for according with building prompt information according to the status indication of the loophole, and will be described Prompt information is sent to the software project management system.
Further, the assets information determining module may include:
Operation system determination unit, for according to the attribute information determination and the target software item association got All operation systems;
Address and port numbers probe unit, for using the IP of server locating for operation system described in nmap tool detection Location and web page browsing port numbers;
The address url crawls unit, for crawling the address url that the operation system accessed using web crawlers;
Attribute information acquiring unit, for obtaining the attribute information of the operation system, the attribute letter of the operation system Type, the type and version, the middleware names of use and version, use of the database of use of server of the breath including deployment Open source software title and version;
Assets information list integral unit is used for the IP address, web page browsing port numbers, the address url and business system The attribute information of system is integrated into assets information list.
Further, the vulnerability scanning module may include:
The library POC loading unit, for loading the library POC, the library POC stores pre-designed each test case;
Assets information reading unit, for reading the assets information in the assets information list;
Test case selection unit is used for choosing target detection from the library POC according to the assets information read Example;
Loophole test cell, for being tested using the target detection use-case the target software project, with true Fixed existing loophole.
Further, the test case selection unit may include:
Loophole type determination unit, for the attribute information according to the operation system read, determination may be produced Raw loophole type;
Test case chooses subelement, for choosing the loophole for detecting the loophole type from the library POC Test case, as the target detection use-case.
Further, the Hole Detection device of the software project can also include:
Loophole ranked queries module, for inquiring the serious etc. of the loophole from the loophole grade table of comparisons constructed in advance Grade;
Time limit determining module is repaired, for determining the reparation time limit of the loophole according to the menace level of the loophole;
Time limit adding module is repaired, for the reparation time limit to be added in the prompt information.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has Computer-readable instruction realizes that any one indicated such as Fig. 1 or Fig. 2 is soft when the computer-readable instruction is executed by processor The step of leak detection method of part project.
The embodiment of the present invention also provides a kind of server, including memory, processor and storage are in the memory And the computer-readable instruction that can be run on the processor, the processor are realized when executing the computer-readable instruction As Fig. 1 or Fig. 2 any one software project indicated leak detection method the step of.
Fig. 4 is the schematic diagram for the server that one embodiment of the invention provides.As shown in figure 4, the server 4 of the embodiment wraps It includes: processor 40, memory 41 and being stored in the computer that can be run in the memory 41 and on the processor 40 Readable instruction 42.The processor 40 realizes the loophole inspection of above-mentioned each software project when executing the computer-readable instruction 42 The step in embodiment of the method, such as step 101 shown in FIG. 1 are surveyed to 105.Alternatively, the processor 40 executes the calculating The function of each module/unit in above-mentioned each Installation practice, such as module 301 to 305 shown in Fig. 3 are realized when machine readable instruction 42 Function.
Illustratively, the computer-readable instruction 42 can be divided into one or more module/units, one Or multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Institute Stating one or more module/units can be the series of computation machine readable instruction section that can complete specific function, the instruction segment For describing implementation procedure of the computer-readable instruction 42 in the server 4.
The server 4 can be desktop PC, notebook, palm PC and cloud server etc. and calculate equipment. The server 4 may include, but be not limited only to, processor 40, memory 41.It will be understood by those skilled in the art that Fig. 4 is only It is the example of server 4, does not constitute the restriction to server 4, may include than illustrating more or fewer components or group Close certain components or different components, for example, the server 4 can also include input-output equipment, network access equipment, Bus etc..
The processor 40 can be central processing unit (CentraL Processing Unit, CPU), can also be Other general processors, digital signal processor (DigitaL SignaL Processor, DSP), specific integrated circuit (AppLication Specific Integrated Circuit, ASIC), ready-made programmable gate array (FieLd- ProgrammabLe Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 41 can be the internal storage unit of the server 4, such as the hard disk or memory of server 4. The memory 41 is also possible to the External memory equipment of the server 4, such as the plug-in type being equipped on the server 4 is hard Disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure DigitaL, SD) card, flash card (FLash Card) etc..Further, the memory 41 can also both include the internal storage unit of the server 4 or wrap Include External memory equipment.The memory 41 is for storing needed for the computer-readable instruction and the server other Program and data.The memory 41 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-OnLy Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of leak detection method of software project characterized by comprising
Software project management system is docked, the attribute information for being currently at the target software project of hair version state is obtained, it is described soft Part project management system is used to record and manage the flow state and attribute information of each software project;
Determine the assets information of the target software project according to the attribute information got, the assets information is and software item The information of the associated hardware of mesh, component and Service Source;
In conjunction with the assets information, the target software project is leaked using the vulnerability scanning mode based on plug-in type POC Hole scanning;
The loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;
Building prompt information is accorded with according to the status indication of the loophole, and the prompt information is sent to the software project pipe Reason system.
2. the leak detection method of software project according to claim 1, which is characterized in that the category that the basis is got Property information determines that the assets information of the target software project includes:
According to the determining all operation systems with the target software item association of the attribute information got;
Use the IP address and web page browsing port numbers of server locating for operation system described in nmap tool detection;
The address url that the operation system accessed is crawled using web crawlers;
Obtain the attribute information of the operation system, the attribute information of the operation system include the server of deployment type, The type and version of the database of use, the middleware names of use and version, use open source software title and version;
The attribute information of the IP address, web page browsing port numbers, the address url and operation system is integrated into assets information column Table.
3. the leak detection method of software project according to claim 2, which is characterized in that the letter of assets described in the combination Breath, carrying out vulnerability scanning to the target software project using the vulnerability scanning mode based on plug-in type POC includes:
The library POC is loaded, the library POC stores pre-designed each test case;
Read the assets information in the assets information list;
Target detection use-case is chosen from the library POC according to the assets information read;
The target software project is tested using the target detection use-case, to determine existing loophole.
4. the leak detection method of software project according to claim 3, which is characterized in that the money that the basis is read Production information chooses target detection use-case from the library POC and includes:
According to the attribute information of the operation system read, issuable loophole type is determined;
The test case for detecting the loophole of the loophole type is chosen from the library POC, is used as the target detection Example.
5. the leak detection method of software project according to any one of claim 1 to 4, which is characterized in that will sweep After the loophole retouched is stored in preset database, further includes:
The menace level of the loophole is inquired from the loophole grade table of comparisons constructed in advance;
The reparation time limit of the loophole is determined according to the menace level of the loophole;
The reparation time limit is added in the prompt information.
6. a kind of Hole Detection device of software project characterized by comprising
Attribute information obtains module, for docking software project management system, obtains the target software for being currently at hair version state The attribute information of project, the software project management system are used to record and manage the flow state and attribute of each software project Information;
Assets information determining module, for determining the assets information of the target software project according to the attribute information got, The assets information is the information with the associated hardware of software project, component and Service Source;
Vulnerability scanning module is used in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the mesh It marks software project and carries out vulnerability scanning;
Loophole memory module distributes state for the loophole scanned to be stored in preset database, and for the loophole Marker character;
Prompt information sending module for according with building prompt information according to the status indication of the loophole, and the prompt is believed Breath is sent to the software project management system.
7. a kind of computer readable storage medium, the computer-readable recording medium storage has computer-readable instruction, special Sign is, the software item as described in any one of claims 1 to 5 is realized when the computer-readable instruction is executed by processor The step of purpose leak detection method.
8. a kind of server, including memory, processor and storage can transport in the memory and on the processor Capable computer-readable instruction, which is characterized in that the processor realizes following steps when executing the computer-readable instruction:
Software project management system is docked, the attribute information for being currently at the target software project of hair version state is obtained, it is described soft Part project management system is used to record and manage the flow state and attribute information of each software project;
Determine the assets information of the target software project according to the attribute information got, the assets information is and software item The information of the associated hardware of mesh, component and Service Source;
In conjunction with the assets information, the target software project is leaked using the vulnerability scanning mode based on plug-in type POC Hole scanning;
The loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;
Building prompt information is accorded with according to the status indication of the loophole, and the prompt information is sent to the software project pipe Reason system.
9. server according to claim 8, which is characterized in that the attribute information that the basis is got determines the mesh Mark software project assets information include:
According to the determining all operation systems with the target software item association of the attribute information got;
Use the IP address and web page browsing port numbers of server locating for operation system described in nmap tool detection;
The address url that the operation system accessed is crawled using web crawlers;
Obtain the attribute information of the operation system, the attribute information of the operation system include the server of deployment type, The type and version of the database of use, the middleware names of use and version, use open source software title and version;
The attribute information of the IP address, web page browsing port numbers, the address url and operation system is integrated into assets information column Table.
10. server according to claim 9, which is characterized in that assets information described in the combination, using based on plug-in unit The vulnerability scanning mode of formula POC carries out vulnerability scanning to the target software project
The library POC is loaded, the library POC stores pre-designed each test case;
Read the assets information in the assets information list;
Target detection use-case is chosen from the library POC according to the assets information read;
The target software project is tested using the target detection use-case, to determine existing loophole.
CN201910294121.4A 2019-04-12 2019-04-12 A kind of leak detection method of software project, device, storage medium and server Pending CN110162971A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910294121.4A CN110162971A (en) 2019-04-12 2019-04-12 A kind of leak detection method of software project, device, storage medium and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910294121.4A CN110162971A (en) 2019-04-12 2019-04-12 A kind of leak detection method of software project, device, storage medium and server

Publications (1)

Publication Number Publication Date
CN110162971A true CN110162971A (en) 2019-08-23

Family

ID=67639360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910294121.4A Pending CN110162971A (en) 2019-04-12 2019-04-12 A kind of leak detection method of software project, device, storage medium and server

Country Status (1)

Country Link
CN (1) CN110162971A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110581849A (en) * 2019-09-06 2019-12-17 中国平安人寿保险股份有限公司 method, device, equipment and storage medium for monitoring historical repaired bugs
CN111143225A (en) * 2019-12-26 2020-05-12 深圳市元征科技股份有限公司 Vulnerability processing method of automobile diagnosis software and related product
CN111610988A (en) * 2020-05-26 2020-09-01 网神信息技术(北京)股份有限公司 Processing method and device for software management
CN111898133A (en) * 2020-07-23 2020-11-06 昆山领创信息科技有限公司 Penetration testing device and method based on automation
CN112507342A (en) * 2020-12-01 2021-03-16 中国人寿保险股份有限公司 Vulnerability detection method and device, electronic equipment and storage medium
CN113158195A (en) * 2021-04-09 2021-07-23 上海碳泽信息科技有限公司 Distributed vulnerability scanning method and system based on POC script
CN114039742A (en) * 2021-09-26 2022-02-11 北京华云安信息技术有限公司 Vulnerability management method, system, device and storage medium
CN114157439A (en) * 2020-08-18 2022-03-08 中国电信股份有限公司 Vulnerability scanning method, computing device and recording medium
CN115664862A (en) * 2022-12-27 2023-01-31 深圳市四格互联信息技术有限公司 Security baseline scanning method, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106557878A (en) * 2016-11-24 2017-04-05 泰康保险集团股份有限公司 Exploration project management method and device
CN108920963A (en) * 2018-07-23 2018-11-30 国网浙江省电力有限公司电力科学研究院 A kind of industrial control system automation Hole Detection plug-in unit generation method and system
CN109413054A (en) * 2018-10-10 2019-03-01 四川长虹电器股份有限公司 The formation gathering method at penetration testing auxiliary system and penetration testing initial stage
CN109542769A (en) * 2018-10-25 2019-03-29 武汉精立电子技术有限公司 A kind of automated testing method of continuous integrating

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106557878A (en) * 2016-11-24 2017-04-05 泰康保险集团股份有限公司 Exploration project management method and device
CN108920963A (en) * 2018-07-23 2018-11-30 国网浙江省电力有限公司电力科学研究院 A kind of industrial control system automation Hole Detection plug-in unit generation method and system
CN109413054A (en) * 2018-10-10 2019-03-01 四川长虹电器股份有限公司 The formation gathering method at penetration testing auxiliary system and penetration testing initial stage
CN109542769A (en) * 2018-10-25 2019-03-29 武汉精立电子技术有限公司 A kind of automated testing method of continuous integrating

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘小鹏: "Tizen系统的安全漏洞扫描工具的实现", 中国优秀硕士学位论文全文数据库信息科技辑, pages 138 - 212 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110581849B (en) * 2019-09-06 2022-11-11 中国平安人寿保险股份有限公司 Method, device, equipment and storage medium for monitoring historical repaired bugs
CN110581849A (en) * 2019-09-06 2019-12-17 中国平安人寿保险股份有限公司 method, device, equipment and storage medium for monitoring historical repaired bugs
CN111143225A (en) * 2019-12-26 2020-05-12 深圳市元征科技股份有限公司 Vulnerability processing method of automobile diagnosis software and related product
CN111143225B (en) * 2019-12-26 2024-05-14 深圳市元征科技股份有限公司 Vulnerability processing method of automobile diagnosis software and related products
CN111610988A (en) * 2020-05-26 2020-09-01 网神信息技术(北京)股份有限公司 Processing method and device for software management
CN111898133A (en) * 2020-07-23 2020-11-06 昆山领创信息科技有限公司 Penetration testing device and method based on automation
CN114157439A (en) * 2020-08-18 2022-03-08 中国电信股份有限公司 Vulnerability scanning method, computing device and recording medium
CN114157439B (en) * 2020-08-18 2024-03-05 中国电信股份有限公司 Vulnerability scanning method, computing device and recording medium
CN112507342A (en) * 2020-12-01 2021-03-16 中国人寿保险股份有限公司 Vulnerability detection method and device, electronic equipment and storage medium
CN113158195B (en) * 2021-04-09 2022-10-11 上海碳泽信息科技有限公司 Distributed vulnerability scanning method and system based on POC script
CN113158195A (en) * 2021-04-09 2021-07-23 上海碳泽信息科技有限公司 Distributed vulnerability scanning method and system based on POC script
CN114039742A (en) * 2021-09-26 2022-02-11 北京华云安信息技术有限公司 Vulnerability management method, system, device and storage medium
CN115664862A (en) * 2022-12-27 2023-01-31 深圳市四格互联信息技术有限公司 Security baseline scanning method, device and storage medium

Similar Documents

Publication Publication Date Title
CN110162971A (en) A kind of leak detection method of software project, device, storage medium and server
Fan Graph pattern matching revised for social network analysis
CN108519945A (en) Coverage rate test method, apparatus and storage device
US20140379667A1 (en) Data quality assessment
US20150269694A1 (en) Catalog-based software license reconciliation
US20130198725A1 (en) Methods for selectively pruning false paths in graphs that use high-precision state information
CN106201861A (en) The detection method of a kind of code quality and device
CN106294134A (en) The collapse localization method of code and device
CN101751333A (en) Method, computer program and computer system for assisting in analyzing program
Hao et al. Cleaning relations using knowledge bases
CN109656986A (en) A kind of householder method that business datum summarizes, device and electronic equipment
CN109885474A (en) Test case edit methods and device, terminal and computer readable storage medium
CN109298855A (en) A kind of network target range management system and its implementation, device, storage medium
CN101819551A (en) Method and system for recording service interaction data of enterprise message system
Agarwal et al. Vulnerability and transaction behavior based detection of malicious smart contracts
Ashraf et al. WeFreS: weighted frequent subgraph mining in a single large graph
US7536602B2 (en) Method and apparatus for evaluating paths in a state machine
CN110362569A (en) The method of calibration and device of tables of data, electronic equipment, storage medium
CN109947654A (en) The method and apparatus automatically updated for test case library
CN110334012A (en) A kind of methods of risk assessment and device
US20080147689A1 (en) Test data registration method, program and apparatus
CN109271453A (en) A kind of determination method and apparatus of database volume
CN108734393A (en) Matching process, user equipment, storage medium and the device of information of real estate
CN109947797A (en) A kind of data detecting device and method
CN103577758A (en) Program code verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination