CN110162971A - A kind of leak detection method of software project, device, storage medium and server - Google Patents
A kind of leak detection method of software project, device, storage medium and server Download PDFInfo
- Publication number
- CN110162971A CN110162971A CN201910294121.4A CN201910294121A CN110162971A CN 110162971 A CN110162971 A CN 110162971A CN 201910294121 A CN201910294121 A CN 201910294121A CN 110162971 A CN110162971 A CN 110162971A
- Authority
- CN
- China
- Prior art keywords
- software project
- information
- loophole
- attribute information
- assets
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Stored Programmes (AREA)
Abstract
The present invention relates to field of computer technology, propose leak detection method, device, storage medium and the server of a kind of software project.Software project management system is docked first, obtains the attribute information for being currently at the target software project of hair version state;Then the assets information that the target software project is determined according to the attribute information got carries out vulnerability scanning to the target software project using the vulnerability scanning mode based on plug-in type POC in conjunction with the assets information;Then the loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;Building prompt information is finally accorded with according to the status indication of the loophole, and the prompt information is sent to the software project management system.It is arranged in this way, after scanning the loophole of some software project, system can construct prompt information automatically and the prompt information is sent to software project management system, so that software developer can be notified in time.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of leak detection methods of software project, device, storage
Medium and server.
Background technique
The development process of one software project generally includes demand analysis, Outline Design, detailed design, software test, soft
Part deliver and check and accept and etc., developer after develop some software project, hair version before, need the software project
It submits to tester to test, relevant code is sent to software post staff again after passing through by test, executes software hair
The work such as cloth.Currently, when tester has found that software project there are when loophole, mainly notifies exploit person by modes such as mails
Member.However, inefficiency in this way, can not in time be tracked the loophole of software project, loophole is easy to cause to repair
The problems such as exceeding the time limit again.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of leak detection method of software project, device, storage medium and
Server can in time be tracked the loophole of software, avoid the problem that generating loophole reparation exceeds the time limit.
The embodiment of the present invention in a first aspect, providing a kind of leak detection method of software project, comprising:
Software project management system is docked, the attribute information for being currently at the target software project of hair version state, institute are obtained
Software project management system is stated for recording and managing the flow state and attribute information of each software project;
Determine the assets information of the target software project according to the attribute information got, the assets information be with it is soft
The information of the hardware of part item association, component and Service Source;
In conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the target software project into
Row vulnerability scanning;
The loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;
Building prompt information is accorded with according to the status indication of the loophole, and the prompt information is sent to the software item
Mesh management system.
The second aspect of the embodiment of the present invention provides a kind of Hole Detection device of software project, comprising:
Attribute information obtains module, for docking software project management system, obtains the target for being currently at hair version state
The attribute information of software project, the software project management system be used for record and manage each software project flow state and
Attribute information;
Assets information determining module, for determining the assets letter of the target software project according to the attribute information got
Breath, the assets information are the information with the associated hardware of software project, component and Service Source;
Vulnerability scanning module is used in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to institute
It states target software project and carries out vulnerability scanning;
Loophole memory module is distributed for the loophole scanned to be stored in preset database, and for the loophole
Status indication symbol;
Prompt information sending module for according with building prompt information according to the status indication of the loophole, and is mentioned described
Show that information is sent to the software project management system.
The third aspect of the embodiment of the present invention, provides a kind of computer readable storage medium, described computer-readable to deposit
Storage media is stored with computer-readable instruction, and such as the embodiment of the present invention is realized when the computer-readable instruction is executed by processor
First aspect propose software project leak detection method the step of.
The fourth aspect of the embodiment of the present invention, provides a kind of server, including memory, processor and is stored in institute
The computer-readable instruction that can be run in memory and on the processor is stated, the processor executes described computer-readable
The step of leak detection method for the software project that the first aspect such as the embodiment of the present invention proposes is realized when instruction.
The leak detection method of software project proposed by the present invention, first docking software project management system, obtain current
The attribute information of target software project in hair version state;Then the target software is determined according to the attribute information got
The assets information of project, in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the target software
Project carries out vulnerability scanning;Then the loophole scanned is stored in preset database, and distributes state for the loophole
Marker character;Building prompt information is finally accorded with according to the status indication of the loophole, and the prompt information is sent to described soft
Part project management system.It is arranged in this way, after scanning the loophole of some software project, system can be constructed automatically and be mentioned
Show information and the prompt information is sent to software project management system (system is software developer system used in everyday
System) so that software developer can be notified in time, the loophole of software project is tracked, avoids generating leakage
Repair the problem of exceeding the time limit in hole.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is a kind of process of one embodiment of the leak detection method of software project provided in an embodiment of the present invention
Figure;
Fig. 2 is a kind of process of second embodiment of the leak detection method of software project provided in an embodiment of the present invention
Figure;
Fig. 3 is a kind of structure of one embodiment of the Hole Detection device of software project provided in an embodiment of the present invention
Figure;
Fig. 4 is a kind of schematic diagram of server provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides a kind of leak detection method of software project, device, storage medium and server, energy
It is enough that the loophole of software is tracked in time, avoid the problem that generating loophole reparation exceeds the time limit.
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention
Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below
Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field
Those of ordinary skill's all other embodiment obtained without making creative work, belongs to protection of the present invention
Range.
Referring to Fig. 1, a kind of one embodiment of the leak detection method of software project includes: in the embodiment of the present invention
101, software project management system is docked, the attribute letter for the target software project for being currently at hair version state is obtained
Breath;
Firstly, docking software project management system, obtains the attribute letter for the target software project for being currently at hair version state
Breath.Software project management system is software developer's operation system used in everyday, for recording and managing each software item
Purpose flow state and attribute information.For example, record the project name of each software project, project number, project be responsible for team,
Project is presently in the attribute informations such as the store path of state, the project cycle, item code.Specifically, the application can be in clothes
Business device end constructs a software project and mentions examining system, and the system is mutually right by calling the api interface of software project management system
It connects, to obtain the attribute information of target software project.
102, the assets information of the target software project is determined according to the attribute information got;
After the attribute information for obtaining the target software project for being currently at hair version state, believed according to the attribute got
Breath determines the assets information of the target software project.Assets information be and the associated hardware of software project, component and service
The information of resource, such as the information such as type of server, type of database and middleware type that software project uses.
103, in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the target software item
Mesh carries out vulnerability scanning;
Then, in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the target software item
Mesh carries out vulnerability scanning.Poc testing, i.e. Proof of Concept are the verifyings for client's concrete application of industry prevalence
Property test, according to user to using system propose performance requirement and extension demand index, carried out on the server of selection
The operation of truthful data carries out practical measuring and calculating to carrying amount of user data and runing time, and is extended according to user's future services
Demand increase data volume to verify the bearing capacity and performance change of system and platform.
When scanning loophole, the library POC is loaded first, which stores pre-designed each test case;Then
The test case in the library POC is chosen in conjunction with assets information;Finally the target software project is carried out using the test case chosen
Test, to determine existing loophole.The library POC stores a large amount of test case, using all test cases to the target software
It is unpractical that project, which carries out test, therefore exploitation environment locating for target software project can be determined according to the assets information, from
And it filters out most suitable a part of test case and is tested.
Further, it when carrying out vulnerability scanning, can be combined with commercial scanner, that is, call existing vulnerability scanning work
Tool carries out vulnerability scanning to the target software project.Specifically, can be used AMVS, APPScan to the target software project into
The scanning of row black box carries out whitepack scanning to the target software item destination code using Fortify.
104, the loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;
After scanning obtains the loophole of target software project, these loopholes are stored in preset database, and are this
A little loophole distribution status indication symbols.Specifically, the state of loophole may include wait check, it is to be confirmed, statement in, ignored, repaired
In multiple, wait the states such as check, be turned off, distinguished with status indication symbol.
105, building prompt information is accorded with according to the status indication of the loophole, and the prompt information is sent to described soft
Part project management system.
System can accord with building prompt information according to the status indication of the loophole, and the prompt information is sent to described soft
Part project management system, with information code, developer pays attention to.For example, if software project scanning discovery is to be checked there are one
Loophole can then construct prompt information " XX software project has loophole to be checked, and please checks in time ", be sent to software project
Management system.
Further, after the loophole scanned is stored in preset database, can also include:
(1) menace level of the loophole is inquired from the loophole grade table of comparisons constructed in advance;
(2) the reparation time limit of the loophole is determined according to the menace level of the loophole;
(3) the reparation time limit is added in the prompt information.
The loophole grade table of comparisons records the menace level of various types loophole, such as seriously, generally, slightly, according to scanning
To the menace level of loophole determine that reparation time limit of the loophole, menace level more high then corresponding reparation time limit are tighter.True
After the reparation time limit for determining loophole, which is added in the prompt information, to remind developer to pay attention in time
Repair the loophole.
The leak detection method for the software project that the embodiment of the present invention proposes, first docking software project management system, are obtained
Take the attribute information for being currently at the target software project of hair version state;Then the mesh is determined according to the attribute information got
The assets information for marking software project, in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the mesh
It marks software project and carries out vulnerability scanning;Then the loophole scanned is stored in preset database, and is the loophole point
It is accorded with status indication;Building prompt information is finally accorded with according to the status indication of the loophole, and the prompt information is sent to
The software project management system.It is arranged in this way, after scanning the loophole of some software project, system can be automatic
The prompt information is simultaneously sent to software project management system (system is software developer's routine use by building prompt information
System), so that software developer can be notified in time, the loophole of software project is tracked, avoids producing
The problem of raw loophole reparation is exceeded the time limit.
Referring to Fig. 2, a kind of second embodiment of the leak detection method of software project includes: in the embodiment of the present invention
201, software project management system is docked, the attribute letter for the target software project for being currently at hair version state is obtained
Breath;
Step 201 is identical as step 101, specifically can refer to the related description of step 101.
202, according to the determining all operation systems with the target software item association of the attribute information got;
After the attribute information for obtaining the target software project for being currently at hair version state, believed according to the attribute got
The determining all operation systems with the target software item association of breath.Specifically, can be by the correlation of associated operation system
Information is recorded in the attribute information of software project.
203, using the IP address of server locating for operation system described in nmap tool detection and web page browsing port numbers;
Then, using the IP address of server locating for operation system described in nmap tool detection and web page browsing port numbers.
Nmap is a network connection end scanning software, and there are three basic functions, first is that whether one group of host of detection is online;Followed by
Scan host port, network service provided by sniff;It may also be inferred that operating system used in host.Specifically, can open
Dynamic nmap multi-process detects 80,443 services on icmp packet and basis using nmap-sn, then scanning port and service hair
It is existing.
204, the address url that the operation system accessed is crawled using web crawlers;
Next the address url that the operation system accessed is crawled using web crawlers, it is preferable to use based on ghost spider
The crawler strategy of spider algorithm, a server limit a main domain and climb 15 layers, and 1,400,000 links can be completed within 2 hours
Crawl task.
205, the attribute information of the operation system is obtained;
In addition, it is also necessary to obtain the attribute information of the operation system, such as operation system deployment server type,
The type and version of the database of use, the subsystem title for including, the middleware names of use and version, the open source of use are soft
The title and version of part, running environment type, HA type and DNS information etc., the attribute information of these operation systems be usually by
The artificial preparatory input system of O&M person liable or Asset Mgmt Dept.
206, the attribute information of the IP address, web page browsing port numbers, the address url and operation system is integrated into assets
Information list;
Then, the attribute information of the IP address, web page browsing port numbers, the address url and operation system is integrated into money
Information list is produced, is stored in specified data library.
207, the library POC is loaded, the library POC stores pre-designed each test case;
When executing vulnerability scanning, the library POC is loaded first, which stores pre-designed each test
Use-case.
208, the assets information in the assets information list is read;
Then, the assets information list is searched from specified database, reads assets information therein.
209, target detection use-case is chosen from the library POC according to the assets information read;
Then, target detection use-case is chosen from the library POC according to the assets information read.
Specifically, step 209 may include:
(1) according to the attribute information of the operation system read, issuable loophole type is determined;
(2) test case for detecting the loophole of the loophole type is chosen from the library POC, as the target
Test case.
Such as, it is known that after middleware type and version, the middleware type and version that are determined due to some there may be
Loophole be known, therefore the test case for detecting the loophole can be chosen from the library POC.Similar, it is known that number
After the type and version in library, database loophole that may be present is also known, therefore can be chosen and be used for from the library POC
Detect the test case of the type and edition data library relevant vulnerability.Type of server, the title of the open source software tool of use
The same procedure that can be used same as version chooses test case.
210, the target software project is tested using the target detection use-case, to determine existing loophole;
After choosing target detection use-case, the target software project is tested using these test cases, with
Determine existing loophole.During implementation of test cases, need using the IP address into assets information, web page browsing end
The information such as slogan and the address url.
211, the loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;
212, building prompt information is accorded with according to the status indication of the loophole, and the prompt information is sent to described soft
Part project management system.
Step 211-212 is identical as step 104-105, specifically can refer to the related description of step 104-105.
The leak detection method for the software project that the embodiment of the present invention proposes, first docking software project management system, are obtained
Take the attribute information for being currently at the target software project of hair version state;Then the mesh is determined according to the attribute information got
The assets information for marking software project, in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the mesh
It marks software project and carries out vulnerability scanning;Then the loophole scanned is stored in preset database, and is the loophole point
It is accorded with status indication;Building prompt information is finally accorded with according to the status indication of the loophole, and the prompt information is sent to
The software project management system.Compared with one embodiment of the invention, the present embodiment proposes a kind of specific determination
The mode of assets information, and the specific mode that POC vulnerability scanning is carried out in conjunction with assets information.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
A kind of leak detection method of software project is essentially described above, a kind of loophole of software project will be examined below
Device is surveyed to be described in detail.
Referring to Fig. 3, a kind of one embodiment of the Hole Detection device of software project includes: in the embodiment of the present invention
Attribute information obtains module 301, for docking software project management system, obtains the mesh for being currently at hair version state
The attribute information of software project is marked, the software project management system is used to record and manage the flow state of each software project
And attribute information;
Assets information determining module 302, for determining the money of the target software project according to the attribute information got
Information is produced, the assets information is the information with the associated hardware of software project, component and Service Source;
Vulnerability scanning module 303, for using the vulnerability scanning mode based on plug-in type POC in conjunction with the assets information
Vulnerability scanning is carried out to the target software project;
Loophole memory module 304 for the loophole scanned to be stored in preset database, and is the loophole point
It is accorded with status indication;
Prompt information sending module 305, for according with building prompt information according to the status indication of the loophole, and will be described
Prompt information is sent to the software project management system.
Further, the assets information determining module may include:
Operation system determination unit, for according to the attribute information determination and the target software item association got
All operation systems;
Address and port numbers probe unit, for using the IP of server locating for operation system described in nmap tool detection
Location and web page browsing port numbers;
The address url crawls unit, for crawling the address url that the operation system accessed using web crawlers;
Attribute information acquiring unit, for obtaining the attribute information of the operation system, the attribute letter of the operation system
Type, the type and version, the middleware names of use and version, use of the database of use of server of the breath including deployment
Open source software title and version;
Assets information list integral unit is used for the IP address, web page browsing port numbers, the address url and business system
The attribute information of system is integrated into assets information list.
Further, the vulnerability scanning module may include:
The library POC loading unit, for loading the library POC, the library POC stores pre-designed each test case;
Assets information reading unit, for reading the assets information in the assets information list;
Test case selection unit is used for choosing target detection from the library POC according to the assets information read
Example;
Loophole test cell, for being tested using the target detection use-case the target software project, with true
Fixed existing loophole.
Further, the test case selection unit may include:
Loophole type determination unit, for the attribute information according to the operation system read, determination may be produced
Raw loophole type;
Test case chooses subelement, for choosing the loophole for detecting the loophole type from the library POC
Test case, as the target detection use-case.
Further, the Hole Detection device of the software project can also include:
Loophole ranked queries module, for inquiring the serious etc. of the loophole from the loophole grade table of comparisons constructed in advance
Grade;
Time limit determining module is repaired, for determining the reparation time limit of the loophole according to the menace level of the loophole;
Time limit adding module is repaired, for the reparation time limit to be added in the prompt information.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has
Computer-readable instruction realizes that any one indicated such as Fig. 1 or Fig. 2 is soft when the computer-readable instruction is executed by processor
The step of leak detection method of part project.
The embodiment of the present invention also provides a kind of server, including memory, processor and storage are in the memory
And the computer-readable instruction that can be run on the processor, the processor are realized when executing the computer-readable instruction
As Fig. 1 or Fig. 2 any one software project indicated leak detection method the step of.
Fig. 4 is the schematic diagram for the server that one embodiment of the invention provides.As shown in figure 4, the server 4 of the embodiment wraps
It includes: processor 40, memory 41 and being stored in the computer that can be run in the memory 41 and on the processor 40
Readable instruction 42.The processor 40 realizes the loophole inspection of above-mentioned each software project when executing the computer-readable instruction 42
The step in embodiment of the method, such as step 101 shown in FIG. 1 are surveyed to 105.Alternatively, the processor 40 executes the calculating
The function of each module/unit in above-mentioned each Installation practice, such as module 301 to 305 shown in Fig. 3 are realized when machine readable instruction 42
Function.
Illustratively, the computer-readable instruction 42 can be divided into one or more module/units, one
Or multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Institute
Stating one or more module/units can be the series of computation machine readable instruction section that can complete specific function, the instruction segment
For describing implementation procedure of the computer-readable instruction 42 in the server 4.
The server 4 can be desktop PC, notebook, palm PC and cloud server etc. and calculate equipment.
The server 4 may include, but be not limited only to, processor 40, memory 41.It will be understood by those skilled in the art that Fig. 4 is only
It is the example of server 4, does not constitute the restriction to server 4, may include than illustrating more or fewer components or group
Close certain components or different components, for example, the server 4 can also include input-output equipment, network access equipment,
Bus etc..
The processor 40 can be central processing unit (CentraL Processing Unit, CPU), can also be
Other general processors, digital signal processor (DigitaL SignaL Processor, DSP), specific integrated circuit
(AppLication Specific Integrated Circuit, ASIC), ready-made programmable gate array (FieLd-
ProgrammabLe Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 41 can be the internal storage unit of the server 4, such as the hard disk or memory of server 4.
The memory 41 is also possible to the External memory equipment of the server 4, such as the plug-in type being equipped on the server 4 is hard
Disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure DigitaL, SD) card, flash card
(FLash Card) etc..Further, the memory 41 can also both include the internal storage unit of the server 4 or wrap
Include External memory equipment.The memory 41 is for storing needed for the computer-readable instruction and the server other
Program and data.The memory 41 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-OnLy
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of leak detection method of software project characterized by comprising
Software project management system is docked, the attribute information for being currently at the target software project of hair version state is obtained, it is described soft
Part project management system is used to record and manage the flow state and attribute information of each software project;
Determine the assets information of the target software project according to the attribute information got, the assets information is and software item
The information of the associated hardware of mesh, component and Service Source;
In conjunction with the assets information, the target software project is leaked using the vulnerability scanning mode based on plug-in type POC
Hole scanning;
The loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;
Building prompt information is accorded with according to the status indication of the loophole, and the prompt information is sent to the software project pipe
Reason system.
2. the leak detection method of software project according to claim 1, which is characterized in that the category that the basis is got
Property information determines that the assets information of the target software project includes:
According to the determining all operation systems with the target software item association of the attribute information got;
Use the IP address and web page browsing port numbers of server locating for operation system described in nmap tool detection;
The address url that the operation system accessed is crawled using web crawlers;
Obtain the attribute information of the operation system, the attribute information of the operation system include the server of deployment type,
The type and version of the database of use, the middleware names of use and version, use open source software title and version;
The attribute information of the IP address, web page browsing port numbers, the address url and operation system is integrated into assets information column
Table.
3. the leak detection method of software project according to claim 2, which is characterized in that the letter of assets described in the combination
Breath, carrying out vulnerability scanning to the target software project using the vulnerability scanning mode based on plug-in type POC includes:
The library POC is loaded, the library POC stores pre-designed each test case;
Read the assets information in the assets information list;
Target detection use-case is chosen from the library POC according to the assets information read;
The target software project is tested using the target detection use-case, to determine existing loophole.
4. the leak detection method of software project according to claim 3, which is characterized in that the money that the basis is read
Production information chooses target detection use-case from the library POC and includes:
According to the attribute information of the operation system read, issuable loophole type is determined;
The test case for detecting the loophole of the loophole type is chosen from the library POC, is used as the target detection
Example.
5. the leak detection method of software project according to any one of claim 1 to 4, which is characterized in that will sweep
After the loophole retouched is stored in preset database, further includes:
The menace level of the loophole is inquired from the loophole grade table of comparisons constructed in advance;
The reparation time limit of the loophole is determined according to the menace level of the loophole;
The reparation time limit is added in the prompt information.
6. a kind of Hole Detection device of software project characterized by comprising
Attribute information obtains module, for docking software project management system, obtains the target software for being currently at hair version state
The attribute information of project, the software project management system are used to record and manage the flow state and attribute of each software project
Information;
Assets information determining module, for determining the assets information of the target software project according to the attribute information got,
The assets information is the information with the associated hardware of software project, component and Service Source;
Vulnerability scanning module is used in conjunction with the assets information, using the vulnerability scanning mode based on plug-in type POC to the mesh
It marks software project and carries out vulnerability scanning;
Loophole memory module distributes state for the loophole scanned to be stored in preset database, and for the loophole
Marker character;
Prompt information sending module for according with building prompt information according to the status indication of the loophole, and the prompt is believed
Breath is sent to the software project management system.
7. a kind of computer readable storage medium, the computer-readable recording medium storage has computer-readable instruction, special
Sign is, the software item as described in any one of claims 1 to 5 is realized when the computer-readable instruction is executed by processor
The step of purpose leak detection method.
8. a kind of server, including memory, processor and storage can transport in the memory and on the processor
Capable computer-readable instruction, which is characterized in that the processor realizes following steps when executing the computer-readable instruction:
Software project management system is docked, the attribute information for being currently at the target software project of hair version state is obtained, it is described soft
Part project management system is used to record and manage the flow state and attribute information of each software project;
Determine the assets information of the target software project according to the attribute information got, the assets information is and software item
The information of the associated hardware of mesh, component and Service Source;
In conjunction with the assets information, the target software project is leaked using the vulnerability scanning mode based on plug-in type POC
Hole scanning;
The loophole scanned is stored in preset database, and distributes status indication symbol for the loophole;
Building prompt information is accorded with according to the status indication of the loophole, and the prompt information is sent to the software project pipe
Reason system.
9. server according to claim 8, which is characterized in that the attribute information that the basis is got determines the mesh
Mark software project assets information include:
According to the determining all operation systems with the target software item association of the attribute information got;
Use the IP address and web page browsing port numbers of server locating for operation system described in nmap tool detection;
The address url that the operation system accessed is crawled using web crawlers;
Obtain the attribute information of the operation system, the attribute information of the operation system include the server of deployment type,
The type and version of the database of use, the middleware names of use and version, use open source software title and version;
The attribute information of the IP address, web page browsing port numbers, the address url and operation system is integrated into assets information column
Table.
10. server according to claim 9, which is characterized in that assets information described in the combination, using based on plug-in unit
The vulnerability scanning mode of formula POC carries out vulnerability scanning to the target software project
The library POC is loaded, the library POC stores pre-designed each test case;
Read the assets information in the assets information list;
Target detection use-case is chosen from the library POC according to the assets information read;
The target software project is tested using the target detection use-case, to determine existing loophole.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910294121.4A CN110162971A (en) | 2019-04-12 | 2019-04-12 | A kind of leak detection method of software project, device, storage medium and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910294121.4A CN110162971A (en) | 2019-04-12 | 2019-04-12 | A kind of leak detection method of software project, device, storage medium and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110162971A true CN110162971A (en) | 2019-08-23 |
Family
ID=67639360
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910294121.4A Pending CN110162971A (en) | 2019-04-12 | 2019-04-12 | A kind of leak detection method of software project, device, storage medium and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110162971A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110581849A (en) * | 2019-09-06 | 2019-12-17 | 中国平安人寿保险股份有限公司 | method, device, equipment and storage medium for monitoring historical repaired bugs |
CN111143225A (en) * | 2019-12-26 | 2020-05-12 | 深圳市元征科技股份有限公司 | Vulnerability processing method of automobile diagnosis software and related product |
CN111610988A (en) * | 2020-05-26 | 2020-09-01 | 网神信息技术(北京)股份有限公司 | Processing method and device for software management |
CN111898133A (en) * | 2020-07-23 | 2020-11-06 | 昆山领创信息科技有限公司 | Penetration testing device and method based on automation |
CN112507342A (en) * | 2020-12-01 | 2021-03-16 | 中国人寿保险股份有限公司 | Vulnerability detection method and device, electronic equipment and storage medium |
CN113158195A (en) * | 2021-04-09 | 2021-07-23 | 上海碳泽信息科技有限公司 | Distributed vulnerability scanning method and system based on POC script |
CN114039742A (en) * | 2021-09-26 | 2022-02-11 | 北京华云安信息技术有限公司 | Vulnerability management method, system, device and storage medium |
CN114157439A (en) * | 2020-08-18 | 2022-03-08 | 中国电信股份有限公司 | Vulnerability scanning method, computing device and recording medium |
CN115664862A (en) * | 2022-12-27 | 2023-01-31 | 深圳市四格互联信息技术有限公司 | Security baseline scanning method, device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106557878A (en) * | 2016-11-24 | 2017-04-05 | 泰康保险集团股份有限公司 | Exploration project management method and device |
CN108920963A (en) * | 2018-07-23 | 2018-11-30 | 国网浙江省电力有限公司电力科学研究院 | A kind of industrial control system automation Hole Detection plug-in unit generation method and system |
CN109413054A (en) * | 2018-10-10 | 2019-03-01 | 四川长虹电器股份有限公司 | The formation gathering method at penetration testing auxiliary system and penetration testing initial stage |
CN109542769A (en) * | 2018-10-25 | 2019-03-29 | 武汉精立电子技术有限公司 | A kind of automated testing method of continuous integrating |
-
2019
- 2019-04-12 CN CN201910294121.4A patent/CN110162971A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106557878A (en) * | 2016-11-24 | 2017-04-05 | 泰康保险集团股份有限公司 | Exploration project management method and device |
CN108920963A (en) * | 2018-07-23 | 2018-11-30 | 国网浙江省电力有限公司电力科学研究院 | A kind of industrial control system automation Hole Detection plug-in unit generation method and system |
CN109413054A (en) * | 2018-10-10 | 2019-03-01 | 四川长虹电器股份有限公司 | The formation gathering method at penetration testing auxiliary system and penetration testing initial stage |
CN109542769A (en) * | 2018-10-25 | 2019-03-29 | 武汉精立电子技术有限公司 | A kind of automated testing method of continuous integrating |
Non-Patent Citations (1)
Title |
---|
刘小鹏: "Tizen系统的安全漏洞扫描工具的实现", 中国优秀硕士学位论文全文数据库信息科技辑, pages 138 - 212 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110581849B (en) * | 2019-09-06 | 2022-11-11 | 中国平安人寿保险股份有限公司 | Method, device, equipment and storage medium for monitoring historical repaired bugs |
CN110581849A (en) * | 2019-09-06 | 2019-12-17 | 中国平安人寿保险股份有限公司 | method, device, equipment and storage medium for monitoring historical repaired bugs |
CN111143225A (en) * | 2019-12-26 | 2020-05-12 | 深圳市元征科技股份有限公司 | Vulnerability processing method of automobile diagnosis software and related product |
CN111143225B (en) * | 2019-12-26 | 2024-05-14 | 深圳市元征科技股份有限公司 | Vulnerability processing method of automobile diagnosis software and related products |
CN111610988A (en) * | 2020-05-26 | 2020-09-01 | 网神信息技术(北京)股份有限公司 | Processing method and device for software management |
CN111898133A (en) * | 2020-07-23 | 2020-11-06 | 昆山领创信息科技有限公司 | Penetration testing device and method based on automation |
CN114157439A (en) * | 2020-08-18 | 2022-03-08 | 中国电信股份有限公司 | Vulnerability scanning method, computing device and recording medium |
CN114157439B (en) * | 2020-08-18 | 2024-03-05 | 中国电信股份有限公司 | Vulnerability scanning method, computing device and recording medium |
CN112507342A (en) * | 2020-12-01 | 2021-03-16 | 中国人寿保险股份有限公司 | Vulnerability detection method and device, electronic equipment and storage medium |
CN113158195B (en) * | 2021-04-09 | 2022-10-11 | 上海碳泽信息科技有限公司 | Distributed vulnerability scanning method and system based on POC script |
CN113158195A (en) * | 2021-04-09 | 2021-07-23 | 上海碳泽信息科技有限公司 | Distributed vulnerability scanning method and system based on POC script |
CN114039742A (en) * | 2021-09-26 | 2022-02-11 | 北京华云安信息技术有限公司 | Vulnerability management method, system, device and storage medium |
CN115664862A (en) * | 2022-12-27 | 2023-01-31 | 深圳市四格互联信息技术有限公司 | Security baseline scanning method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110162971A (en) | A kind of leak detection method of software project, device, storage medium and server | |
Fan | Graph pattern matching revised for social network analysis | |
CN108519945A (en) | Coverage rate test method, apparatus and storage device | |
US20140379667A1 (en) | Data quality assessment | |
US20150269694A1 (en) | Catalog-based software license reconciliation | |
US20130198725A1 (en) | Methods for selectively pruning false paths in graphs that use high-precision state information | |
CN106201861A (en) | The detection method of a kind of code quality and device | |
CN106294134A (en) | The collapse localization method of code and device | |
CN101751333A (en) | Method, computer program and computer system for assisting in analyzing program | |
Hao et al. | Cleaning relations using knowledge bases | |
CN109656986A (en) | A kind of householder method that business datum summarizes, device and electronic equipment | |
CN109885474A (en) | Test case edit methods and device, terminal and computer readable storage medium | |
CN109298855A (en) | A kind of network target range management system and its implementation, device, storage medium | |
CN101819551A (en) | Method and system for recording service interaction data of enterprise message system | |
Agarwal et al. | Vulnerability and transaction behavior based detection of malicious smart contracts | |
Ashraf et al. | WeFreS: weighted frequent subgraph mining in a single large graph | |
US7536602B2 (en) | Method and apparatus for evaluating paths in a state machine | |
CN110362569A (en) | The method of calibration and device of tables of data, electronic equipment, storage medium | |
CN109947654A (en) | The method and apparatus automatically updated for test case library | |
CN110334012A (en) | A kind of methods of risk assessment and device | |
US20080147689A1 (en) | Test data registration method, program and apparatus | |
CN109271453A (en) | A kind of determination method and apparatus of database volume | |
CN108734393A (en) | Matching process, user equipment, storage medium and the device of information of real estate | |
CN109947797A (en) | A kind of data detecting device and method | |
CN103577758A (en) | Program code verification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |