CN111309311B - Method, device, equipment and readable storage medium for generating a vulnerability detection tool - Google Patents
Method, device, equipment and readable storage medium for generating a vulnerability detection tool Download PDFInfo
- Publication number
- CN111309311B CN111309311B CN202010143934.6A CN202010143934A CN111309311B CN 111309311 B CN111309311 B CN 111309311B CN 202010143934 A CN202010143934 A CN 202010143934A CN 111309311 B CN111309311 B CN 111309311B
- Authority
- CN
- China
- Prior art keywords
- script
- target
- vulnerability
- detection tool
- vulnerability detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 112
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000013515 script Methods 0.000 claims abstract description 209
- 238000006243 chemical reaction Methods 0.000 claims abstract description 64
- 238000000605 extraction Methods 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 12
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Stored Programmes (AREA)
Abstract
Description
技术领域technical field
本发明涉及网络安全技术领域,特别涉及一种漏洞检测工具生成方法、漏洞检测工具生成装置、漏洞检测工具生成设备及计算机可读存储介质。The invention relates to the technical field of network security, in particular to a method for generating a vulnerability detection tool, a device for generating a vulnerability detection tool, a device for generating a vulnerability detection tool, and a computer-readable storage medium.
背景技术Background technique
随着互联网的高速发展,互联网中各种操作系统、应用软件的漏洞也日益增多。对于爆发出来的漏洞,及时地进行漏洞检测的工作变得刻不容缓。With the rapid development of the Internet, the loopholes of various operating systems and application software in the Internet are also increasing day by day. For the leaks that break out, it is imperative to timely detect the leaks.
当互联网中爆发出某个漏洞之后,为了检测目标终端是否存在该漏洞。一般采用漏洞扫描系统或漏洞检测工具对目标终端做全面评估,检测是否存在该漏洞。漏洞扫描系统由专业的安全厂商开发,系统磁盘占用空间大,不利于安装部署,且漏洞扫描系统的安装部署和使用都相对复杂,对使用者有一定的网络安全技术要求,因此在实际情况中,安装有漏洞扫描系统的终端数量较少,大量普通用户并不会安装或使用漏洞扫描系统。漏洞检测工具为针对某一漏洞专门开发的漏洞检测工具检测,其占用空间小,安装简单,对使用者要求较低,便于普通用户使用。在实际的场景中,一旦某个特定的漏洞被爆发出来,安全厂商会针对该漏洞对漏洞扫描系统进行升级,以提高漏洞扫描系统的安全能力。但是由于漏洞检测工具需要针对性的开发,且开发工作需要较长时间,因此往往无法被及时开发并投入应用,使大量普通用户遭到了攻击者利用漏洞发起的攻击。When a vulnerability breaks out in the Internet, in order to detect whether the vulnerability exists in the target terminal. Generally, a vulnerability scanning system or a vulnerability detection tool is used to conduct a comprehensive assessment of the target terminal to detect whether the vulnerability exists. The vulnerability scanning system is developed by a professional security vendor. The system disk takes up a lot of space, which is not conducive to installation and deployment. The installation, deployment and use of the vulnerability scanning system are relatively complicated, and there are certain network security technical requirements for users. Therefore, in actual situations , the number of terminals installed with the vulnerability scanning system is relatively small, and a large number of ordinary users do not install or use the vulnerability scanning system. The vulnerability detection tool is a vulnerability detection tool specially developed for a certain vulnerability. It occupies a small space, is easy to install, has low requirements for users, and is convenient for ordinary users to use. In actual scenarios, once a specific vulnerability is exposed, security vendors will upgrade the vulnerability scanning system to improve the security capability of the vulnerability scanning system. However, because vulnerability detection tools need to be developed in a targeted manner, and the development work takes a long time, they are often not developed and put into application in a timely manner, causing a large number of ordinary users to be attacked by attackers using vulnerabilities.
因此,如何解决现有专项漏洞检测方法需要针对性开发,开发工作需要较长时间的问题,是本领域技术人员需要解决的技术问题。Therefore, how to solve the problem that the existing special vulnerability detection method requires targeted development, and the development work takes a long time is a technical problem to be solved by those skilled in the art.
发明内容Contents of the invention
有鉴于此,本发明的目的在于提供一种漏洞检测工具生成方法、漏洞检测工具生成装置、漏洞检测工具生成设备及计算机可读存储介质,解决了现有专项漏洞检测方法需要针对性开发,开发工作需要较长时间的问题。In view of this, the object of the present invention is to provide a method for generating a vulnerability detection tool, a device for generating a vulnerability detection tool, a device for generating a vulnerability detection tool, and a computer-readable storage medium, which solves the need for targeted development of existing special vulnerability detection methods, and develops Problems that take a long time to work on.
为解决上述技术问题,本发明提供了一种漏洞检测工具生成方法,包括:In order to solve the above technical problems, the present invention provides a method for generating a vulnerability detection tool, comprising:
获取生成指令并解析,确定所述生成指令指定的目标漏洞;Obtaining and parsing the generation instruction to determine the target vulnerability specified by the generation instruction;
获取所述目标漏洞对应的漏洞脚本,对所述漏洞脚本添加入口代码,得到目标脚本;Obtaining a vulnerability script corresponding to the target vulnerability, adding an entry code to the vulnerability script, and obtaining the target script;
确定所述目标脚本对应的脚本语言,根据所述脚本语言将所述目标脚本转换为目标格式,得到所述漏洞检测工具。A script language corresponding to the target script is determined, and the target script is converted into a target format according to the script language to obtain the vulnerability detection tool.
可选地,所述根据所述脚本语言将所述目标脚本转换为目标格式,得到所述漏洞检测工具,包括:Optionally, converting the target script into a target format according to the scripting language to obtain the vulnerability detection tool includes:
根据所述脚本语言确定所述脚本语言对应的转换规则;determining a conversion rule corresponding to the script language according to the script language;
利用所述转换规则中的提取规则对所述目标脚本进行信息提取处理,得到脚本信息;performing information extraction processing on the target script by using the extraction rules in the conversion rules to obtain script information;
利用所述转换规则中的生成规则对所述脚本信息进行可执行文件生成处理,得到所述漏洞检测工具。The executable file generation process is performed on the script information by using the generation rule in the conversion rule to obtain the vulnerability detection tool.
可选地,所述确定所述目标脚本对应的脚本语言,包括:Optionally, the determining the scripting language corresponding to the target script includes:
获取所述目标脚本对应的脚本属性,利用所述脚本属性确定所述目标脚本对应的文件后缀;Obtaining the script attribute corresponding to the target script, using the script attribute to determine the file suffix corresponding to the target script;
利用预设对应关系确定所述文件后缀对应的所述脚本语言。The script language corresponding to the file suffix is determined by using a preset correspondence relationship.
可选地,所述根据所述脚本语言将所述目标脚本转换为目标格式,得到所述漏洞检测工具,包括:Optionally, converting the target script into a target format according to the scripting language to obtain the vulnerability detection tool includes:
按照所述脚本语言确定对应的转换工具;Determine the corresponding conversion tool according to the scripting language;
利用所述转换工具将所述目标脚本转换为所述目标格式,得到所述漏洞检测工具。The conversion tool is used to convert the target script into the target format to obtain the vulnerability detection tool.
本发明还提供了一种漏洞检测工具生成装置,包括:The present invention also provides a device for generating a vulnerability detection tool, including:
目标漏洞确定模块,用于获取生成指令并解析,确定所述生成指令指定的目标漏洞;The target vulnerability determination module is used to obtain and analyze the generation instruction, and determine the target vulnerability specified by the generation instruction;
脚本语言确定模块,用于获取所述目标漏洞对应的漏洞脚本,对所述漏洞脚本添加入口代码,得到目标脚本;The script language determination module is used to obtain the vulnerability script corresponding to the target vulnerability, and add entry code to the vulnerability script to obtain the target script;
工具生成模块,用于确定所述目标脚本对应的脚本语言,根据所述脚本语言将所述目标脚本转换为目标格式,得到所述漏洞检测工具。The tool generation module is configured to determine the scripting language corresponding to the target script, convert the target script into a target format according to the scripting language, and obtain the vulnerability detection tool.
可选地,所述工具生成模块,包括:Optionally, the tool generation module includes:
转换规则确定单元,用于根据所述脚本语言确定所述脚本语言对应的转换规则;a conversion rule determination unit, configured to determine a conversion rule corresponding to the script language according to the script language;
脚本信息获取单元,用于利用所述转换规则中的提取规则对所述目标脚本进行信息提取处理,得到脚本信息;a script information acquisition unit, configured to use the extraction rules in the conversion rules to perform information extraction processing on the target script to obtain script information;
第一转换单元,用于利用所述转换规则中的生成规则对所述脚本信息进行可执行文件生成处理,得到所述漏洞检测工具。The first conversion unit is configured to use the generation rules in the conversion rules to generate executable files on the script information to obtain the vulnerability detection tool.
可选地,所述工具生成模块,包括:Optionally, the tool generation module includes:
文件后缀确定单元,用于获取所述目标脚本对应的脚本属性,利用所述脚本属性确定所述目标脚本对应的文件后缀;A file suffix determining unit, configured to obtain a script attribute corresponding to the target script, and use the script attribute to determine a file suffix corresponding to the target script;
脚本语言确定单元,用于利用预设对应关系确定所述文件后缀对应的所述脚本语言。A scripting language determining unit, configured to determine the scripting language corresponding to the file suffix by using a preset correspondence.
可选地,所述工具生成模块,包括:Optionally, the tool generation module includes:
转换工具确定单元,用于按照所述脚本语言确定对应的转换工具;A conversion tool determining unit, configured to determine a corresponding conversion tool according to the script language;
第二转换单元,用于利用所述转换工具将所述目标脚本转换为所述目标格式,得到所述漏洞检测工具。The second conversion unit is configured to use the conversion tool to convert the target script into the target format to obtain the vulnerability detection tool.
本发明还提供了一种漏洞检测工具生成设备,包括存储器和处理器,其中:The present invention also provides a vulnerability detection tool generation device, including a memory and a processor, wherein:
所述存储器,用于保存计算机程序;The memory is used to store computer programs;
所述处理器,用于执行所述计算机程序,以实现上述的漏洞检测工具生成方法。The processor is configured to execute the computer program, so as to realize the above method for generating a vulnerability detection tool.
本发明还提供了一种计算机可读存储介质,用于保存计算机程序,其中,所述计算机程序被处理器执行时实现上述的漏洞检测工具生成方法。The present invention also provides a computer-readable storage medium for storing a computer program, wherein, when the computer program is executed by a processor, the above method for generating a vulnerability detection tool is realized.
本发明提供的漏洞检测工具生成方法,获取生成指令并解析,确定生成指令指定的目标漏洞。获取目标漏洞对应的漏洞脚本,对漏洞脚本添加入口代码,得到目标脚本。确定目标脚本对应的脚本语言,根据脚本语言将目标脚本转换为目标格式,得到漏洞检测工具。The method for generating a vulnerability detection tool provided by the present invention obtains and analyzes the generation instruction, and determines the target vulnerability specified by the generation instruction. Obtain the vulnerability script corresponding to the target vulnerability, add the entry code to the vulnerability script, and obtain the target script. Determine the scripting language corresponding to the target script, convert the target script into a target format according to the scripting language, and obtain a vulnerability detection tool.
可见,在确定指定的目标漏洞后,确定目标漏洞对应的漏洞脚本,通过为漏洞脚本添加入口代码以得到可以被进行转换处理的目标脚本。在确定目标脚本对应的脚本语言后对其进行转换处理,即可得到漏洞检测工具。该方法不需要采用针对性开发的方法来编写开发漏洞检测工具,通过对已有的漏洞脚本进行增加入口代码的处理,进而进行格式转换处理即可得到漏洞检测工具。减少了漏洞检测工具的开发时间,使大量普通用户也可以避免攻击者利用漏洞发起的攻击,解决了现有专项漏洞检测方法需要针对性开发,且开发工作需要较长时间的问题。It can be seen that after the specified target vulnerability is determined, the vulnerability script corresponding to the target vulnerability is determined, and the target script that can be converted and processed is obtained by adding entry codes to the vulnerability script. After the scripting language corresponding to the target script is determined, it is converted and processed, and the vulnerability detection tool can be obtained. This method does not need to use a targeted development method to write and develop a vulnerability detection tool, and the vulnerability detection tool can be obtained by adding entry codes to the existing vulnerability scripts, and then performing format conversion processing. The development time of vulnerability detection tools is reduced, so that a large number of ordinary users can also avoid attacks launched by attackers using vulnerabilities, and the problem that existing special vulnerability detection methods need to be developed in a targeted manner, and the development work takes a long time.
此外,本发明还提供了一种漏洞检测工具生成装置、漏洞检测工具生成设备及计算机可读存储介质,同样具有上述有益效果。In addition, the present invention also provides a vulnerability detection tool generation device, a vulnerability detection tool generation device and a computer-readable storage medium, which also have the above beneficial effects.
附图说明Description of drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only It is an embodiment of the present invention, and those skilled in the art can also obtain other drawings according to the provided drawings without creative work.
图1为本发明实施例提供的一种漏洞检测工具生成方法流程图;FIG. 1 is a flowchart of a method for generating a vulnerability detection tool provided by an embodiment of the present invention;
图2为本发明实施例提供的一种具体的格式转换方法流程图;FIG. 2 is a flow chart of a specific format conversion method provided by an embodiment of the present invention;
图3为本发明实施例提供的一种漏洞检测工具生成装置的结构示意图;FIG. 3 is a schematic structural diagram of a device for generating a vulnerability detection tool provided by an embodiment of the present invention;
图4为本发明实施例提供的一种漏洞检测工具生成设备的结构示意图。FIG. 4 is a schematic structural diagram of a vulnerability detection tool generation device provided by an embodiment of the present invention.
具体实施方式Detailed ways
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
请参考图1,图1为本发明实施例提供的一种漏洞检测工具生成方法流程图。该方法包括:Please refer to FIG. 1 , which is a flowchart of a method for generating a vulnerability detection tool provided by an embodiment of the present invention. The method includes:
S101:获取生成指令并解析,确定生成指令指定的目标漏洞。S101: Obtain and analyze the generation instruction, and determine the target vulnerability specified by the generation instruction.
具体的,本发明提供的漏洞检测工具生成方法的全部或部分步骤可以由指定的设备或终端完成,例如可以由指定的Windows系统计算机完成。生成指令用于指定目标漏洞,在接受到生成指令后,对生成指令进行解析,以便确定目标漏洞,在后续步骤中生成用于对目标漏洞进行检测的漏洞检测工具。目标漏洞的类型可以为Windows操作系统的漏洞,或者可以为Linux操作系统的漏洞,或者可以为其他类型的漏洞。对于生成指令的具体内容,本实施例不做限定。为了指定目标漏洞,生成指令中可以包括漏洞信息,漏洞信息具体可以为目标漏洞的名称,或者可以为目标漏洞的序号。根据漏洞信息可以确定生成指令指定的目标漏洞。Specifically, all or part of the steps of the method for generating a vulnerability detection tool provided by the present invention can be completed by a designated device or terminal, for example, a designated Windows system computer. The generation instruction is used to specify the target vulnerability. After the generation instruction is received, the generation instruction is parsed to determine the target vulnerability, and a vulnerability detection tool for detecting the target vulnerability is generated in a subsequent step. The type of the target vulnerability may be a vulnerability of the Windows operating system, or may be a vulnerability of the Linux operating system, or may be other types of vulnerabilities. The specific content of the generating instruction is not limited in this embodiment. In order to specify the target vulnerability, the generation instruction may include vulnerability information, and the vulnerability information may specifically be a name of the target vulnerability, or may be a serial number of the target vulnerability. According to the vulnerability information, the target vulnerability specified by the generation instruction can be determined.
本实施例并不限定生成指令的获取方法,例如可以获取控制人员输入的生成指令,或者可以获取其他设备或终端发送的生成指令。当通过获取控制人员输入的生成指令的方式获取生成指令是,本实施例不限定生成指令的具体输入方法,例如控制人员可以手动输入生成指令;或者可以设置有预设规则,控制人员输入或选择目标漏洞,点击确定后根据预设规则构建对应的生成指令。This embodiment does not limit the method for obtaining the generation instruction. For example, the generation instruction input by the controller may be obtained, or the generation instruction sent by other devices or terminals may be obtained. When the generation instruction is obtained by obtaining the generation instruction input by the controller, this embodiment does not limit the specific input method of the generation instruction, for example, the controller can manually input the generation instruction; or a preset rule can be set, and the controller can input or select Target vulnerability, click OK and build the corresponding generation command according to the preset rules.
S102:获取目标漏洞对应的漏洞脚本,对漏洞脚本添加入口代码,得到目标脚本。S102: Obtain a vulnerability script corresponding to the target vulnerability, add an entry code to the vulnerability script, and obtain the target script.
在确定目标漏洞后,获取目标漏洞对应的漏洞脚本。本实施例并不限定漏洞脚本的具体获取方法,例如可以从指定的漏洞扫描系统的漏洞库中获取,或者可以由其他设备或终端发送得到,或者可以由控制人员上传得到。漏洞代码为漏洞扫描系统使用的漏洞库中的脚本,用于漏洞扫描系统进行调用解析进而进行扫描,其具体为不可执行的漏洞脚本,例如可以为JS脚本,或者可以为Python脚本,或者可以为Lua脚本。由于漏洞脚本不可执行,因此无法被用作漏洞检测工具,为了而快速得到漏洞检测工具,可以通过对其进行格式转换处理的方式得到对应的漏洞检测工具。After determining the target vulnerability, obtain the vulnerability script corresponding to the target vulnerability. This embodiment does not limit the specific method of obtaining the vulnerability script. For example, it can be obtained from the vulnerability library of a specified vulnerability scanning system, or it can be sent by other devices or terminals, or it can be uploaded by the controller. Vulnerability codes are scripts in the vulnerability library used by the vulnerability scanning system, which are used by the vulnerability scanning system to perform call parsing and then scan. Specifically, they are non-executable vulnerability scripts, such as JS scripts, Python scripts, or Lua script. Since the vulnerability script is not executable, it cannot be used as a vulnerability detection tool. In order to quickly obtain the vulnerability detection tool, the corresponding vulnerability detection tool can be obtained by performing format conversion processing on it.
需要说明的是,由于漏洞脚本原本用于漏洞扫描系统进行调用解析,因此无法直接对其进行格式转换。在获取漏洞脚本后,为其添加入口代码,进而得到目标脚本,以便进行格式转换处理。入口代码的具体形式本实施例不做限定,根据漏洞脚本的脚本语言的不同,其对应的入口代码的形式以及内容也会不同。目标脚本为可以被进行格式转化的脚本,利用目标脚本可以得到目标漏洞对应的漏洞检测工具。It should be noted that since the vulnerability script is originally used for call parsing by the vulnerability scanning system, it cannot be converted directly. After obtaining the vulnerable script, add the entry code to it, and then obtain the target script for format conversion processing. The specific form of the entry code is not limited in this embodiment. Depending on the script language of the vulnerability script, the form and content of the corresponding entry code will also be different. The target script is a script that can be converted into a format, and the vulnerability detection tool corresponding to the target vulnerability can be obtained by using the target script.
S103:确定目标脚本对应的脚本语言,根据脚本语言将目标脚本转换为目标格式,得到漏洞检测工具。S103: Determine the script language corresponding to the target script, convert the target script into a target format according to the script language, and obtain a vulnerability detection tool.
不同脚本语言的目标脚本的编写规则不同,为了将目标脚本转换为目标格式,需要在转换之前确定目标脚本对应的脚本语言。需要说明的是,目标格式为可执行文件格式,在将目标脚本转换为可执行文件格式后,即得到漏洞检测工具。本申请并不限定确定目标脚本对应的脚本语言的确定方法,例如可以通过目标脚本的内容确定其对应的脚本语言,具体的,可以检测目标脚本中代码的语法等信息,用来确定其对应的脚本语言。The writing rules of target scripts in different scripting languages are different. In order to convert target scripts into target formats, it is necessary to determine the scripting language corresponding to the target scripts before conversion. It should be noted that the target format is an executable file format, and the vulnerability detection tool is obtained after converting the target script into an executable file format. This application does not limit the method of determining the script language corresponding to the target script. For example, the content of the target script can be used to determine the corresponding script language. Specifically, information such as the syntax of the code in the target script can be detected to determine the corresponding script language. scripting language.
进一步,为了准确地确定脚本语言,本实施例优选的,获取目标脚本对应的脚本属性,利用脚本属性确定目标脚本对应的文件后缀;利用预设对应关系确定文件后缀对应的脚本语言。需要说明的是,脚本属性用于记录目标脚本的属性,即目标脚本的文件属性。脚本属性中记录有目标脚本的文件后缀,文件后缀可以表示目标脚本的文件类型。由于不同的脚本语言生成的目标脚本对应的文件类型不同,因此设置有预设对应关系,用于记录各种脚本语言与文件后缀的对应关系,在确定目标脚本对应的文件后缀后,利用预设对应关系即可确定文件后缀对应的脚本语言,即可确定目标脚本对应的脚本语言。例如当目标脚本被命名为vul时,可以获取vul脚本的脚本属性,从脚本属性中确定vul对应的文件后缀,例如为py。当确定文件后缀为py后,根据预设对应关系,可以确定目标脚本由Python语言编写而成,即其对应的脚本语言为Python。Further, in order to accurately determine the script language, this embodiment preferably acquires the script attribute corresponding to the target script, uses the script attribute to determine the file suffix corresponding to the target script; uses the preset correspondence to determine the script language corresponding to the file suffix. It should be noted that the script attribute is used to record the attribute of the target script, that is, the file attribute of the target script. The file suffix of the target script is recorded in the script attribute, and the file suffix may indicate the file type of the target script. Since the target scripts generated by different scripting languages correspond to different file types, there are preset correspondences to record the correspondence between various scripting languages and file suffixes. After determining the file suffixes corresponding to the target scripts, use the preset The corresponding relationship can determine the script language corresponding to the file suffix, and can determine the script language corresponding to the target script. For example, when the target script is named vul, the script attribute of the vul script can be obtained, and the file suffix corresponding to vul can be determined from the script attribute, such as py. After the file suffix is determined to be py, according to the preset corresponding relationship, it can be determined that the target script is written in the Python language, that is, the corresponding scripting language is Python.
进一步,在得到漏洞检测工具后,可以执行后续操作,例如向目标设备发送漏洞检测工具;或者可以发出生成完毕通知;或者可以对漏洞检测工具进行检测,判断是否存在错误。本实施例并不限定后续操作的具体内容。Further, after obtaining the vulnerability detection tool, follow-up operations can be performed, such as sending the vulnerability detection tool to the target device; or sending a notification of completion of generation; or detecting the vulnerability detection tool to determine whether there is an error. This embodiment does not limit the specific content of subsequent operations.
应用本发明实施例提供的漏洞检测工具生成方法,在确定指定的目标漏洞后,确定目标漏洞对应的漏洞脚本,通过为漏洞脚本添加入口代码以得到可以被进行转换处理的目标脚本。在确定目标脚本对应的脚本语言后对其进行转换处理,即可得到漏洞检测工具。该方法不需要采用针对性开发的方法来编写开发漏洞检测工具,通过对已有的漏洞脚本进行增加入口代码的处理,进而进行格式转换处理即可得到漏洞检测工具。减少了漏洞检测工具的开发时间,使大量普通用户也可以避免攻击者利用漏洞发起的攻击,解决了现有专项漏洞检测方法需要针对性开发,且开发工作需要较长时间的问题。Applying the method for generating the vulnerability detection tool provided by the embodiment of the present invention, after determining the specified target vulnerability, determine the vulnerability script corresponding to the target vulnerability, and obtain the target script that can be converted by adding entry codes to the vulnerability script. After the scripting language corresponding to the target script is determined, it is converted and processed, and the vulnerability detection tool can be obtained. This method does not need to use a targeted development method to write and develop a vulnerability detection tool, and the vulnerability detection tool can be obtained by adding entry codes to the existing vulnerability scripts, and then performing format conversion processing. The development time of vulnerability detection tools is reduced, so that a large number of ordinary users can also avoid attacks launched by attackers using vulnerabilities, and the problem that existing special vulnerability detection methods need to be developed in a targeted manner, and the development work takes a long time.
基于上述发明实施例,本发明实施例将说明一种具体的格式转换方法。请参考图2,图2为本发明实施例提供的一种具体的格式转换方法流程图,包括:Based on the foregoing embodiments of the present invention, the embodiments of the present invention will describe a specific format conversion method. Please refer to FIG. 2. FIG. 2 is a flowchart of a specific format conversion method provided by an embodiment of the present invention, including:
S201:根据脚本语言确定脚本语言对应的转换规则。S201: Determine a conversion rule corresponding to the script language according to the script language.
需要说明的是,在本发明实施例中,利用转换规则将目标脚本转换为目标格式,即可执行文件格式。由于不同的脚本语言的语法规则不同,因此不同的脚本语言对应的转换规则也不同,在对目标脚本进行转换之前,需要确定脚本语言对应的转换规则。具体的,可以在本地存储各种脚本语言对应的转换规则,在确定目标脚本对应的脚本语言后,利用索引信息获取该脚本语言对应的转换规则。It should be noted that, in the embodiment of the present invention, the conversion rule is used to convert the target script into the target format, that is, the executable file format. Since the grammatical rules of different script languages are different, the conversion rules corresponding to different script languages are also different. Before converting the target script, it is necessary to determine the conversion rules corresponding to the script language. Specifically, the conversion rules corresponding to various script languages may be stored locally, and after the script language corresponding to the target script is determined, the conversion rules corresponding to the script language may be obtained by using index information.
S202:利用转换规则中的提取规则对目标脚本进行信息提取处理,得到脚本信息。S202: Use the extraction rules in the conversion rules to perform information extraction processing on the target script to obtain script information.
在本发明实施例中,转换规则包括提取规则和生成规则。提取规则用于对目标脚本进行信息提取处理,得到脚本信息;生成规则用于对脚本信息进行处理生成漏洞检测工具。由于不同脚本语言对应的编写规则不同,因此不同转换规则中的提取规则不同。不同转换规则中的生成规则可以相同也可以不同,例如为了保证生成可靠性,防止漏洞检测工具出现故障,可以为不同的脚本语言设置不同的生成规则;或者为了保证一致性,可以为不同的脚本语言设置相同的生成规则。In the embodiment of the present invention, the conversion rules include extraction rules and generation rules. Extraction rules are used to extract information from target scripts to obtain script information; generation rules are used to process script information to generate vulnerability detection tools. Since the writing rules corresponding to different scripting languages are different, the extraction rules in different conversion rules are different. The generation rules in different conversion rules can be the same or different. For example, in order to ensure the reliability of generation and prevent the failure of vulnerability detection tools, different generation rules can be set for different script languages; or in order to ensure consistency, different scripts can be set The same build rules are set for language.
脚本信息用于生成漏洞检测工具,其具体内容本实施例不做限定,不同的目标脚本对应的脚本信息的内容不同。The script information is used to generate the vulnerability detection tool, and its specific content is not limited in this embodiment, and the content of the script information corresponding to different target scripts is different.
S203:利用转换规则中的生成规则对脚本信息进行可执行文件生成处理,得到漏洞检测工具。S203: Using the generation rule in the conversion rule to generate an executable file on the script information to obtain a vulnerability detection tool.
在得到脚本信息后,利用转换规则中的生成规则对脚本信息进行可执行文件生成处理。即按照生成规则,对脚本信息进行处理,即可得到漏洞检测工具,无需开发人员手动编写漏洞检测工具,减少了漏洞检测工具的开发时间,使大量普通用户也可以避免攻击者利用漏洞发起的攻击,解决了现有专项漏洞检测方法需要针对性开发,且开发工作需要较长时间的问题。After the script information is obtained, an executable file generation process is performed on the script information by using the generation rule in the conversion rule. That is, according to the generation rules, the script information is processed to obtain the vulnerability detection tool, which does not require developers to manually write the vulnerability detection tool, reduces the development time of the vulnerability detection tool, and enables a large number of ordinary users to avoid attacks initiated by attackers using vulnerabilities , which solves the problem that the existing special vulnerability detection method needs targeted development, and the development work takes a long time.
进一步,为了提高漏洞检测工具的生成速度和生成效率,本实施例中优选的,预设有多个转换工具,每个转换工具对应的脚本语言不同。在执行根据脚本语言将目标脚本转换为目标格式,得到漏洞检测工具的步骤时,可以按照脚本语言确定对应的转换工具,利用转换工具将目标脚本转换为目标格式,得到漏洞检测工具。具体的,利用转换工具可以同时完成脚本信息提取和可执行文件生成处理两个步骤,提高了漏洞检测工具的生成速度。例如,当目标脚本为vul.py时,其对应的脚本语言为Python,因此根据脚本语言确定对应的转换工具为pyinstaller工具,因此利用pyinstaller工具对目标脚本进行格式转换处理,即可得到漏洞检测工具。Further, in order to improve the generation speed and efficiency of the vulnerability detection tool, preferably in this embodiment, multiple conversion tools are preset, and each conversion tool corresponds to a different script language. When performing the step of converting the target script into the target format according to the script language to obtain the vulnerability detection tool, the corresponding conversion tool can be determined according to the script language, and the target script is converted into the target format by using the conversion tool to obtain the vulnerability detection tool. Specifically, the conversion tool can simultaneously complete two steps of script information extraction and executable file generation processing, which improves the generation speed of the vulnerability detection tool. For example, when the target script is vul.py, the corresponding script language is Python, so the corresponding conversion tool is determined to be the pyinstaller tool according to the script language, so use the pyinstaller tool to convert the format of the target script to obtain the vulnerability detection tool .
下面对本发明实施例提供的漏洞检测工具生成装置进行介绍,下文描述的漏洞检测工具生成装置与上文描述的漏洞检测工具生成方法可相互对应参照。The device for generating a vulnerability detection tool provided by an embodiment of the present invention is introduced below, and the device for generating a vulnerability detection tool described below and the method for generating a vulnerability detection tool described above can be referred to in correspondence.
请参考图3,图3为本发明实施例提供的一种漏洞检测工具生成装置的结构示意图,包括:Please refer to FIG. 3. FIG. 3 is a schematic structural diagram of a vulnerability detection tool generation device provided by an embodiment of the present invention, including:
目标漏洞确定模块310,用于获取生成指令并解析,确定生成指令指定的目标漏洞;The target
目标脚本获取模块320,用于获取目标漏洞对应的漏洞脚本,对漏洞脚本添加入口代码,得到目标脚本;The target
工具生成模块330,用于确定目标脚本对应的脚本语言,根据脚本语言将目标脚本转换为目标格式,得到漏洞检测工具。The
可选地,工具生成模块330,包括:Optionally, the
转换规则确定单元,用于根据脚本语言确定脚本语言对应的转换规则;A conversion rule determining unit, configured to determine a conversion rule corresponding to the script language according to the script language;
脚本信息获取单元,用于利用转换规则中的提取规则对目标脚本进行信息提取处理,得到脚本信息;a script information acquisition unit, configured to extract information from the target script by using the extraction rules in the conversion rules to obtain script information;
第一转换单元,用于利用转换规则中的生成规则对脚本信息进行可执行文件生成处理,得到漏洞检测工具。The first conversion unit is configured to use the generation rules in the conversion rules to generate an executable file on the script information to obtain a vulnerability detection tool.
可选地,工具生成模块330,包括:Optionally, the
文件后缀确定单元,用于获取目标脚本对应的脚本属性,利用脚本属性确定目标脚本对应的文件后缀;A file suffix determining unit, configured to obtain the script attribute corresponding to the target script, and determine the file suffix corresponding to the target script by using the script attribute;
脚本语言确定单元,用于利用预设对应关系确定文件后缀对应的脚本语言。The scripting language determination unit is configured to determine the scripting language corresponding to the file suffix by using the preset corresponding relationship.
可选地,工具生成模块330,包括:Optionally, the
转换工具确定单元,用于按照脚本语言确定对应的转换工具;A conversion tool determining unit, configured to determine a corresponding conversion tool according to the script language;
第二转换单元,用于利用转换工具将目标脚本转换为目标格式,得到漏洞检测工具。The second conversion unit is used to convert the target script into the target format by using the conversion tool to obtain the vulnerability detection tool.
下面对本发明实施例提供的漏洞检测工具生成设备进行介绍,下文描述的漏洞检测工具生成设备与上文描述的漏洞检测工具生成方法可相互对应参照。The device for generating a vulnerability detection tool provided by the embodiment of the present invention is introduced below, and the device for generating a vulnerability detection tool described below and the method for generating a vulnerability detection tool described above can be referred to in correspondence.
请参考图4,图4为本发明实施例提供的一种漏洞检测工具生成设备的结构示意图,该漏洞检测工具生成设备包括存储器、处理器,其中:Please refer to FIG. 4. FIG. 4 is a schematic structural diagram of a vulnerability detection tool generation device provided by an embodiment of the present invention. The vulnerability detection tool generation device includes a memory and a processor, wherein:
存储器410,用于保存计算机程序;
处理器420,用于执行计算机程序,以实现上述的漏洞检测工具生成方法。The
下面对本发明实施例提供的计算机可读存储介质进行介绍,下文描述的计算机可读存储介质与上文描述的漏洞检测工具生成方法可相互对应参照。The computer-readable storage medium provided by the embodiments of the present invention is introduced below, and the computer-readable storage medium described below and the method for generating a vulnerability detection tool described above can be referred to in correspondence.
本发明还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,计算机程序被处理器执行时实现上述的漏洞检测工具生成方法的步骤。The present invention also provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the steps of the above-mentioned method for generating a vulnerability detection tool are realized.
该计算机可读存储介质可以包括:U盘、移动硬盘、只读存储器(Read-OnlyMemory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。The computer-readable storage medium may include: U disk, mobile hard disk, read-only memory (Read-OnlyMemory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk, etc., which can store program codes. medium.
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同或相似部分互相参见即可。对于实施例公开的装置而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。Each embodiment in this specification is described in a progressive manner, each embodiment focuses on the difference from other embodiments, and the same or similar parts of each embodiment can be referred to each other. As for the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and for the related information, please refer to the description of the method part.
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应该认为超出本发明的范围。Professionals can further realize that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, computer software or a combination of the two. In order to clearly illustrate the possible For interchangeability, in the above description, the composition and steps of each example have been generally described according to their functions. Whether these functions are executed by means of hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present invention.
结合本文中所公开的实施例描述的方法或算法的步骤可以直接用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。The steps of the methods or algorithms described in connection with the embodiments disclosed herein may be directly implemented by hardware, software modules executed by a processor, or a combination of both. Software modules can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or any other Any other known storage medium.
最后,还需要说明的是,在本文中,诸如第一和第二等之类的关系属于仅仅用来将一个实体或者操作与另一个实体或者操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其他任何变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。Finally, it should also be noted that in this article, relationships such as first and second etc. are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply that these entities or operations, any such actual relationship or order exists. Furthermore, the term "comprises", "comprising", or any other variation is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also items not expressly listed. other elements, or also include elements inherent in such a process, method, article, or apparatus.
以上对本发明所提供的一种漏洞检测工具生成方法、漏洞检测工具生成装置、漏洞检测工具生成设备及计算机可读存储介质进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。A method for generating a vulnerability detection tool, a device for generating a vulnerability detection tool, a device for generating a vulnerability detection tool, and a computer-readable storage medium provided by the present invention have been described above in detail. In this paper, specific examples are used to explain the principle and implementation of the present invention. Elaborated, the description of the above embodiments is only used to help understand the method of the present invention and its core idea; at the same time, for those of ordinary skill in the art, according to the idea of the present invention, there will be specific implementation methods and application scopes. Changes, in summary, the contents of this specification should not be construed as limiting the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010143934.6A CN111309311B (en) | 2020-03-04 | 2020-03-04 | Method, device, equipment and readable storage medium for generating a vulnerability detection tool |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010143934.6A CN111309311B (en) | 2020-03-04 | 2020-03-04 | Method, device, equipment and readable storage medium for generating a vulnerability detection tool |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111309311A CN111309311A (en) | 2020-06-19 |
CN111309311B true CN111309311B (en) | 2023-04-25 |
Family
ID=71160333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010143934.6A Active CN111309311B (en) | 2020-03-04 | 2020-03-04 | Method, device, equipment and readable storage medium for generating a vulnerability detection tool |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111309311B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117097513B (en) * | 2023-07-14 | 2024-11-29 | 博智安全科技股份有限公司 | A custom vulnerability detection and vulnerability exploitation system and method |
CN118606952A (en) * | 2024-05-31 | 2024-09-06 | 北京天融信网络安全技术有限公司 | Vulnerability detection method, device, equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105991554A (en) * | 2015-02-04 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Vulnerability detection method and equipment |
CN107145784A (en) * | 2017-05-04 | 2017-09-08 | 腾讯科技(深圳)有限公司 | A kind of method of vulnerability scanning, device and computer-readable medium |
CN107454081A (en) * | 2017-08-07 | 2017-12-08 | 四川长虹电器股份有限公司 | The method for automatically generating POC scripts |
CN108011898A (en) * | 2018-01-30 | 2018-05-08 | 上海壹账通金融科技有限公司 | Leak detection method, device, computer equipment and storage medium |
CN108537042A (en) * | 2018-04-04 | 2018-09-14 | 上海有云信息技术有限公司 | Self-defined plug-in unit generation method, device, equipment and storage medium |
CN108920963A (en) * | 2018-07-23 | 2018-11-30 | 国网浙江省电力有限公司电力科学研究院 | A kind of industrial control system automation Hole Detection plug-in unit generation method and system |
CN109522723A (en) * | 2018-11-14 | 2019-03-26 | 平安科技(深圳)有限公司 | POC scenario generation method, device, electronic equipment and storage medium |
CN110135169A (en) * | 2019-05-21 | 2019-08-16 | 江苏亨通工控安全研究院有限公司 | Leak detection method and device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070113282A1 (en) * | 2005-11-17 | 2007-05-17 | Ross Robert F | Systems and methods for detecting and disabling malicious script code |
US10223533B2 (en) * | 2014-10-21 | 2019-03-05 | Veracode, Inc. | Systems and methods for analysis of cross-site scripting vulnerabilities |
-
2020
- 2020-03-04 CN CN202010143934.6A patent/CN111309311B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105991554A (en) * | 2015-02-04 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Vulnerability detection method and equipment |
CN107145784A (en) * | 2017-05-04 | 2017-09-08 | 腾讯科技(深圳)有限公司 | A kind of method of vulnerability scanning, device and computer-readable medium |
CN107454081A (en) * | 2017-08-07 | 2017-12-08 | 四川长虹电器股份有限公司 | The method for automatically generating POC scripts |
CN108011898A (en) * | 2018-01-30 | 2018-05-08 | 上海壹账通金融科技有限公司 | Leak detection method, device, computer equipment and storage medium |
CN108537042A (en) * | 2018-04-04 | 2018-09-14 | 上海有云信息技术有限公司 | Self-defined plug-in unit generation method, device, equipment and storage medium |
CN108920963A (en) * | 2018-07-23 | 2018-11-30 | 国网浙江省电力有限公司电力科学研究院 | A kind of industrial control system automation Hole Detection plug-in unit generation method and system |
CN109522723A (en) * | 2018-11-14 | 2019-03-26 | 平安科技(深圳)有限公司 | POC scenario generation method, device, electronic equipment and storage medium |
CN110135169A (en) * | 2019-05-21 | 2019-08-16 | 江苏亨通工控安全研究院有限公司 | Leak detection method and device |
Non-Patent Citations (2)
Title |
---|
张嘉元 ; .一种基于匹配的Android系统漏洞检测方法.电信科学.2016,(05),全文. * |
王晓艳 ; 牟景华 ; .网络漏洞扫描器的设计.福建电脑.2007,(05),全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN111309311A (en) | 2020-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8806649B2 (en) | Generating vulnerability reports based on application binary interface/application programming interface usage | |
CN110764945A (en) | Crash log processing method, device, equipment and storage medium | |
CN111290806B (en) | Calling method and device of application program interface, computer equipment and storage medium | |
US9665465B1 (en) | Automated determination of application permissions | |
US9507933B2 (en) | Program execution apparatus and program analysis apparatus | |
CN104360920A (en) | Automatic testing method and device for interface | |
US20150293898A1 (en) | Method and apparatus for word detection in application program | |
CN111309311B (en) | Method, device, equipment and readable storage medium for generating a vulnerability detection tool | |
CN102707958B (en) | A kind of interface generation method of calibration and equipment based on open platform | |
CN110955409A (en) | Method and device for creating resources on cloud platform | |
CN113760729A (en) | A code detection method and device | |
US10691798B2 (en) | Analysis device, analysis method, and analysis program | |
CN113656301A (en) | An interface testing method, device, equipment and storage medium | |
CN110727476B (en) | Method, device, equipment and storage medium for generating authorization configuration file | |
CN112748930B (en) | Compilation detection method, device, equipment and storage medium | |
CN118069110A (en) | A software code compilation method and instruction soft implementation method, device, electronic device and storage medium | |
CN112084445A (en) | Information processing system, method and apparatus, storage medium | |
CN115292707A (en) | Credibility judgment method and device based on dynamic class call sequence | |
CN114675989A (en) | Data verification method and device, electronic equipment and storage medium | |
CN111078570B (en) | Parameter format detection method, device, equipment and medium based on interface framework | |
KR20240011475A (en) | METHOD AND APPARATUS FOR IoT FIRMWARE VULNERABILITY DETECTION USING ADAPTIVE EMULATION TECHNIQUE | |
CN112417390A (en) | File processing method, device, equipment and storage medium | |
CN117034210B (en) | Event image generation method and device, storage medium and electronic equipment | |
JP6818568B2 (en) | Communication device, communication specification difference extraction method and communication specification difference extraction program | |
CN113660096B (en) | A method, device, electronic device and storage medium for requesting signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20200619 Assignee: Hangzhou Anheng Information Security Technology Co.,Ltd. Assignor: Dbappsecurity Co.,Ltd. Contract record no.: X2024980043364 Denomination of invention: A method, apparatus, device, and readable storage medium for generating vulnerability detection tools Granted publication date: 20230425 License type: Common License Record date: 20241231 |