CN111552645A - Open type safety compliance permeability testing system - Google Patents

Open type safety compliance permeability testing system Download PDF

Info

Publication number
CN111552645A
CN111552645A CN202010357357.0A CN202010357357A CN111552645A CN 111552645 A CN111552645 A CN 111552645A CN 202010357357 A CN202010357357 A CN 202010357357A CN 111552645 A CN111552645 A CN 111552645A
Authority
CN
China
Prior art keywords
module
data packet
testing
fuzz
safety compliance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010357357.0A
Other languages
Chinese (zh)
Other versions
CN111552645B (en
Inventor
周赟
曹嘉宁
许康先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010357357.0A priority Critical patent/CN111552645B/en
Publication of CN111552645A publication Critical patent/CN111552645A/en
Application granted granted Critical
Publication of CN111552645B publication Critical patent/CN111552645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3676Test management for coverage analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management

Abstract

The invention discloses an open type safety compliance penetration testing system, which comprises: the system comprises a data packet analysis module, an automatic fuzz engine, a user-defined payload module, a report generation module and a work scheduling module; wherein the data packet analysis module: inputting an http protocol data packet in a txt text format, and analyzing the http protocol data packet into structural data for testing through the module; automated fuzz engine: data interaction is carried out on the tcp protocol and the tested interface, and meanwhile, the program execution flow is asynchronous, so that the utilization rate of equipment resources and the testing efficiency can be maximized. By adopting the penetration testing tool constructed by the invention, safety testing personnel can quickly and efficiently make a safety compliance check item by simply defining input and output and result judgment rules, the test coverage rate of a service system interface is improved, and the test time is greatly shortened.

Description

Open type safety compliance permeability testing system
Technical Field
The invention relates to a test system, in particular to an open type safety compliance penetration test system.
Background
Among the closest prior art solutions are the burpsoite product of PortSwigger corporation. Although the prior art scheme can manually complete part of penetration test work, if the tested system page and parameters are numerous and complex, the prior art scheme can cause the following 2 problems:
1: testing all system pages and parameters cannot be done in a short period of time.
2: if some pages and parameters are selectively tested, security problems may be missed.
The reason for the problem 1 is that Burp Suite does not have the capability to fully automatically check all system parameters.
The reason for the problem 2 is that the Burp Suite product is heavily dependent on the technical ability of testers, and a qualified technical expert can select possible vulnerabilities to test by experience instead of testing all system parameters comprehensively, which causes the problem that the security problem is missed.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides an open type safety compliance penetration testing system.
In order to solve the technical problems, the invention provides the following technical scheme:
the invention relates to an open type safety compliance penetration testing system, which comprises: the system comprises a data packet analysis module, an automatic fuzz engine, a user-defined payload module, a report generation module and a work scheduling module;
wherein the data packet analysis module: inputting an http protocol data packet in a txt text format, and analyzing the http protocol data packet into structural data for testing through the module;
wherein the automated fuzz engine: the method comprises the steps that a tcp protocol is adopted to carry out data interaction with a tested interface, meanwhile, an asynchronous program execution process is adopted, the utilization rate of equipment resources and the testing efficiency can be maximized, the specific execution process is that a socket is used for establishing connection with a service interface, a plurality of socket requests are established simultaneously through an asynchronous calling method, a CPU continuously creates a sent data packet during the period of waiting for network data return, a result processing function is called back when the requested data return is carried out, the blocking waiting of the CPU in network IO is prevented, and the CPU and bandwidth resources are utilized to the maximum extent;
the user-defined payload module comprises: a rule input template is defined, and a user can quickly generate a safety compliance rule only by simple definition;
wherein the report generation module: a report format required by the penetration test result is quickly generated; the test result is stored in a markdown text form, and the test result can be quickly rendered by using a result command;
the work scheduling module: the method comprises the functions of parameter analysis and automatic work scheduling, and the work flow of each module is coordinated.
Compared with the prior art, the invention has the following beneficial effects:
1: the invention automatically tests all pages and related parameters of the system, can improve the efficiency by times and save a large amount of time for testing the system safety.
2: the invention can comprehensively test all pages and related parameters of the system, ensures that all system parameters are not omitted, and does not need the experience of technical experts to select parameter test.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic flow diagram of the system of the present invention;
FIG. 2 is a schematic diagram of an http packet of the present invention;
FIG. 3 is a diagram illustrating the present invention parsing into an httpParser object;
FIG. 4 is a schematic diagram of socket establishing connection and sending data according to the present invention;
FIG. 5 is a schematic diagram of a rule template of the present invention;
FIG. 6 is a diagram illustrating markdown source file rendering results of the present invention;
FIG. 7 is a schematic diagram of a markdown source file of the present invention;
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example 1
As shown in fig. 1-7, the present invention provides an open safety compliance penetration test system comprising: the system comprises a data packet analysis module, an automatic fuzz engine, a user-defined payload module, a report generation module and a work scheduling module; wherein the data packet analysis module: inputting an http protocol data packet in a txt text format, and analyzing the http protocol data packet into structural data for testing through the module; automated fuzz engine: the method comprises the steps that a tcp protocol is adopted to carry out data interaction with a tested interface, meanwhile, a program execution process is asynchronous, the utilization rate of equipment resources and the testing efficiency can be maximized, the specific execution process is that a socket is used for establishing connection with a service interface, a plurality of socket requests are established simultaneously through an asynchronous calling method, a CPU continuously creates a sent data packet during the period of waiting for network data return, a result processing function is called back when the requested data return is carried out, the CPU is prevented from blocking and waiting in network IO, and the CPU and bandwidth resources are utilized to the maximum extent; the user-defined payload module comprises: a rule input template is defined, and a user can quickly generate a safety compliance rule only by simple definition; wherein the report generation module: rapidly generating a report format required by a penetration test result; the test result is stored in a markdown text form, and the test result can be quickly rendered by using a result command; the work scheduling module: the method comprises the functions of parameter analysis and automatic work scheduling, and the work flow of each module is coordinated.
Specifically, the system comprises: the system comprises a data packet analysis module, an automatic fuzz engine, a user-defined payload module, a report generation module and a work scheduling module.
A data packet analysis module: and inputting the http protocol data packet in a txt text format, and analyzing the http protocol data packet into structural data for testing through the module. For example, fig. 2 shows a typical http data request packet, which is parsed into an httpParser object through an httpParser class;
automated fuzz engine: the tcp protocol is adopted to carry out data interaction with the tested interface, so that the fuzz engine is not limited to a certain application protocol, a test object has universality, and meanwhile, the program execution process is asynchronous, and the utilization rate of equipment resources and the test efficiency can be maximized. The specific execution process is that a socket is used for establishing connection with a service interface, a plurality of socket requests are established simultaneously through an asynchronous calling method, a CPU continuously creates a transmitted data packet during waiting for network data return, and a result processing function is called back when the requested data return, so that the CPU is prevented from blocking and waiting in network IO, and the CPU and bandwidth resources are utilized to the maximum extent;
self-defining payload module: the rule input template is defined, and a user can quickly generate the safety compliance rule only by simple definition. The following is a rule template, where logpath sets the log storage location of the results produced during the scan; chapter sets a test item title; details of the test items are set by the clients; rule sets are matched with a socket return value acquired in the fuzzy engine, and return results are matched according to defined characteristic values, wherein the rule is passed through by testing beginning with 0, the rule is not passed by testing beginning with 1, and the rule is not applied to testing beginning with 2. For example, setting the rule "0 all temporal parameters do not expect expected to be objectable", the result interpreted as matching the "0 all temporal parameters do not expect expected to be objectable" character represents no SQL injection problem; the result stores the test result, and the result sets the test command used in the test item (os _ command ('ls', verbose));
a report generation module: a report format required by the penetration test result is quickly generated; the test result is stored in a markdown text form, and the test result can be quickly rendered by using a result command;
the work scheduling module: the method comprises the functions of parameter analysis and automatic work scheduling, and the work flow of each module is coordinated.
By adopting the penetration testing tool constructed by the invention, safety testing personnel can quickly and efficiently make safety compliance check items through simply defining input and output and result judgment rules, the test coverage rate of the service system interface is improved, and the test time is greatly shortened.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (1)

1. An open safety compliance penetration test system, comprising: the system comprises a data packet analysis module, an automatic fuzz engine, a user-defined payload module, a report generation module and a work scheduling module;
wherein the data packet analysis module: inputting an http protocol data packet in a txt text format, and analyzing the http protocol data packet into structural data for testing through the module;
wherein the automated fuzz engine: the method comprises the steps that a tcp protocol is adopted to carry out data interaction with a tested interface, meanwhile, a program execution process is asynchronous, the utilization rate of equipment resources and the testing efficiency can be maximized, the specific execution process is that a socket is used for establishing connection with a service interface, a plurality of socket requests are established simultaneously through an asynchronous calling method, a CPU continuously creates a sent data packet during the period of waiting for network data return, when the requested data return is carried out, a result processing function is called back, the blocking waiting of the CPU in network IO is prevented, and the CPU and bandwidth resources are utilized to the maximum extent;
the user-defined payload module comprises: a rule input template is defined, and a user can quickly generate a safety compliance rule only by simple definition;
wherein the report generation module: a report format required by the penetration test result is quickly generated; the test result is stored in a markdown text form, and the test result can be quickly rendered by using a result command;
the work scheduling module: the method comprises the functions of parameter analysis and automatic work scheduling, and the work flow of each module is coordinated.
CN202010357357.0A 2020-04-29 2020-04-29 Open type safety compliance penetration test system Active CN111552645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010357357.0A CN111552645B (en) 2020-04-29 2020-04-29 Open type safety compliance penetration test system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010357357.0A CN111552645B (en) 2020-04-29 2020-04-29 Open type safety compliance penetration test system

Publications (2)

Publication Number Publication Date
CN111552645A true CN111552645A (en) 2020-08-18
CN111552645B CN111552645B (en) 2023-05-12

Family

ID=72003295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010357357.0A Active CN111552645B (en) 2020-04-29 2020-04-29 Open type safety compliance penetration test system

Country Status (1)

Country Link
CN (1) CN111552645B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090271351A1 (en) * 2008-04-29 2009-10-29 Affiliated Computer Services, Inc. Rules engine test harness
CN105681126A (en) * 2015-12-30 2016-06-15 合一网络技术(北京)有限公司 Automatic test method and system based on protocol interface
CN105740148A (en) * 2016-01-29 2016-07-06 博雅网信(北京)科技有限公司 Script engine system of mobile terminal automation test and testing method
CN108737425A (en) * 2018-05-24 2018-11-02 北京凌云信安科技有限公司 Fragility based on multi engine vulnerability scanning association analysis manages system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090271351A1 (en) * 2008-04-29 2009-10-29 Affiliated Computer Services, Inc. Rules engine test harness
CN105681126A (en) * 2015-12-30 2016-06-15 合一网络技术(北京)有限公司 Automatic test method and system based on protocol interface
CN105740148A (en) * 2016-01-29 2016-07-06 博雅网信(北京)科技有限公司 Script engine system of mobile terminal automation test and testing method
CN108737425A (en) * 2018-05-24 2018-11-02 北京凌云信安科技有限公司 Fragility based on multi engine vulnerability scanning association analysis manages system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈晓梅;田洋;王宝生;: "基于AX4000的路由器用户自定义报文性能测试设计与实现" *

Also Published As

Publication number Publication date
CN111552645B (en) 2023-05-12

Similar Documents

Publication Publication Date Title
CN105335293B (en) A kind of automatization test system and method based on interface concurrent
US20050010545A1 (en) Method and system for managing events
CN110740103A (en) Service request processing method and device, computer equipment and storage medium
CN108256118B (en) Data processing method, device, system, computing equipment and storage medium
US8972575B2 (en) Server-side web analytics system and method
US20120036275A1 (en) Message traffic interception system
CN109560996B (en) Automatic testing system and method for terminal of Internet of things
CN112954050B (en) Distributed management method and device, management equipment and computer storage medium
CN105763507A (en) Message processing method, device and system
CN106484425A (en) A kind of abnormality eliminating method of policy-based configuration
US20190073600A1 (en) Skipping maintenance mode of applications
CN111209166A (en) Automatic inspection system for B/S architecture business system
CN113609012B (en) Method and system for normalized processing back-end exception reporting
CN108121606B (en) Method and device for generating coded data based on joint debugging interface
CN105117344B (en) A kind of Interface integration method of testing and system based on PB
CN111552645A (en) Open type safety compliance permeability testing system
CN110968476B (en) Method and device for automatically monitoring login information of Linux system
CN107317826A (en) A kind of method that java network system rights managements are realized based on blocker
US20220417330A1 (en) System and methods for application programming interface validation and testing
CN104270431B (en) A kind of method and device of con current control
CN113778709B (en) Interface calling method, device, server and storage medium
CN115348086A (en) Attack protection method and device, storage medium and electronic equipment
CN112131095B (en) Pressure testing method and device
CN112835794A (en) Method and system for positioning and monitoring code execution problem based on Swoole
CN107066538B (en) Data statistics method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant