CN111552645B - Open type safety compliance penetration test system - Google Patents

Open type safety compliance penetration test system Download PDF

Info

Publication number
CN111552645B
CN111552645B CN202010357357.0A CN202010357357A CN111552645B CN 111552645 B CN111552645 B CN 111552645B CN 202010357357 A CN202010357357 A CN 202010357357A CN 111552645 B CN111552645 B CN 111552645B
Authority
CN
China
Prior art keywords
module
data packet
fuzz
engine
safety compliance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010357357.0A
Other languages
Chinese (zh)
Other versions
CN111552645A (en
Inventor
周赟
曹嘉宁
许康先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010357357.0A priority Critical patent/CN111552645B/en
Publication of CN111552645A publication Critical patent/CN111552645A/en
Application granted granted Critical
Publication of CN111552645B publication Critical patent/CN111552645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3676Test management for coverage analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses an open type safety compliance penetration test system, which comprises: the system comprises a data packet analysis module, an automatic fuzz engine, a custom payload module, a report generation module and a work scheduling module; wherein the data packet analysis module: inputting an http protocol data packet in a txt text format, and analyzing the http protocol data packet into structural data for testing by the module; automated fuzz engine: and the tcp protocol is adopted to carry out data interaction with the tested interface, and meanwhile, the program execution flow is asynchronous, so that the equipment resource utilization rate and the testing efficiency can be maximized. By adopting the penetration test tool constructed by the invention, safety testers can quickly and efficiently prepare safety compliance inspection items through simple definition of input and output and result judgment rules, the test coverage rate of interfaces of a service system is improved, and the test time is greatly shortened.

Description

Open type safety compliance penetration test system
Technical Field
The invention relates to a testing system, in particular to an open type safety compliance penetration testing system.
Background
Of the prior art, the closest prior art solution is the burppsuite product of PortSwigger corporation. Although the prior art scheme can manually complete the partial penetration test, if the tested system pages and parameters are numerous and complex, the prior art scheme can cause the following 2 problems:
1: testing all system pages and parameters cannot be done in a short period of time.
2: selectively testing portions of the page and parameters can result in missing security issues.
The reason for problem 1 is that Burp Suite does not have the ability to fully automatically check all system parameters.
The problem 2 arises because the Burp Suite product relies heavily on the tester's technical capabilities and sophisticated technical specialists can choose, empirically, the possible weak points to test, rather than testing all system parameters comprehensively, which can lead to problems with missed security issues.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide an open type safety compliance penetration test system.
In order to solve the technical problems, the invention provides the following technical scheme:
the invention provides an open safety compliance penetration test system, which comprises: the system comprises a data packet analysis module, an automatic fuzz engine, a custom payload module, a report generation module and a work scheduling module;
wherein the data packet analysis module: inputting an http protocol data packet in a txt text format, and analyzing the http protocol data packet into structural data for testing by the module;
wherein the fuzz engine is automated: the method comprises the steps of adopting a tcp protocol to interact data with a tested interface, and simultaneously, performing a procedure of executing an asynchronous program to maximize the utilization rate of equipment resources and the testing efficiency, wherein the specific execution procedure is to establish connection between a socket and a service interface, simultaneously establish a plurality of socket requests by an asynchronous calling method, continuously create a transmitted data packet by a CPU during waiting for data return of a network, and call back a result processing function when the requested data return, prevent the CPU from blocking and waiting in network IO and maximally utilize the CPU and bandwidth resources;
wherein the custom payload module: the rule input template is defined, and a user can quickly generate the safety compliance rule only by simple definition;
wherein the report generation module: a report format required by a penetration test result is rapidly generated; the test result is stored in a markdown text form, and can be quickly rendered by using a result command;
the work scheduling module: the method comprises the steps of parameter analysis, automatic work scheduling function and coordination of the work flows of the modules.
Compared with the prior art, the invention has the following beneficial effects:
1: the invention automatically tests all pages and related parameters of the system, can improve the efficiency by several times, and saves a great amount of system safety testing time.
2: the invention comprehensively tests all pages and related parameters of the system, ensures that all system parameters are not missed, and does not need the experience of technical experts to select the parameter test.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a schematic flow diagram of a system of the present invention;
FIG. 2 is a schematic diagram of an http packet according to the present invention;
FIG. 3 is a schematic diagram of the parsing to httPParser object of the present invention;
fig. 4 is a schematic diagram of socket connection establishment and data transmission according to the present invention;
FIG. 5 is a schematic diagram of a rule template of the present invention;
FIG. 6 is a schematic diagram of a markdown source file rendering result of the present invention;
FIG. 7 is a schematic representation of a markdown source file of the present invention;
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present invention only, and are not intended to limit the present invention.
Example 1
As shown in fig. 1-7, the present invention provides an open safety compliance penetration testing system comprising: the system comprises a data packet analysis module, an automatic fuzz engine, a custom payload module, a report generation module and a work scheduling module; wherein the data packet analysis module: inputting an http protocol data packet in a txt text format, and analyzing the http protocol data packet into structural data for testing by the module; automated fuzz engine: the method comprises the steps of establishing connection between a socket and a service interface, simultaneously establishing a plurality of socket requests by using an asynchronous calling method, continuously creating a transmitted data packet by a CPU during the period of waiting for data return of a network, and calling back a result processing function when the requested data return, so as to prevent the CPU from blocking and waiting in a network IO and maximally utilizing the CPU and bandwidth resources; wherein the custom payload module: the rule input template is defined, and a user can quickly generate the safety compliance rule only by simple definition; wherein the report generation module: rapidly generating a report format required by the penetration test result; the test result is stored in a markdown text form, and can be quickly rendered by using a result command; the work scheduling module: the method comprises the steps of parameter analysis, automatic work scheduling function and coordination of the work flows of the modules.
Specifically, the system comprises: the system comprises a data packet analysis module, an automatic fuzz engine, a custom payload module, a report generation module and a work scheduling module.
And a data packet analysis module: the http protocol data packet is input in txt text format, and is analyzed by the module into the structural data for testing. For example, FIG. 2 is a typical http data request packet parsed into httpParser objects by the httpParser class;
automated fuzz engine: the tcp protocol is adopted to carry out data interaction with the tested interface, so that the fuzz engine is not only limited to a certain application protocol, the test object has more universality, and meanwhile, the program execution flow is asynchronous, so that the equipment resource utilization rate and the test efficiency can be maximized. The specific implementation process is that a socket is used for establishing connection with a service interface, a plurality of socket requests are established simultaneously through an asynchronous calling method, a CPU continuously builds a transmitted data packet during waiting for network return data, and when the request data returns, a callback is used for a result processing function, so that the CPU is prevented from blocking and waiting in a network IO, and CPU and bandwidth resources are utilized to the maximum extent;
custom payload module: a rule input template is defined, and a user can quickly generate the safety compliance rule by simply defining the rule input template. The following is a rule template, where the logpath sets the log storage location of the results generated during the scan; the testing item title is set by the chapter; details of the details setting test item; and matching socket return values acquired from the fuzz engine according to the rule set, and matching the return results according to the defined characteristic values, wherein the rule set is used for indicating that the test passes the rule, the rule set is used for indicating that the test fails the rule set at 0, and the rule set is used for indicating that the rule set is not applicable. For example, setting a rule of "0alltested parameters do not appear to be injectable", a result interpreted as matching the "0all tested parameters do not appear to be injectable" character represents no SQL injection problem; result saves test results, and result=os_command ('ls', verbose) sets test commands used in the test item;
a report generation module: a report format required by a penetration test result is rapidly generated; the test result is stored in a markdown text form, and can be quickly rendered by using a result command;
the work scheduling module: the method comprises the steps of parameter analysis, automatic work scheduling function and coordination of the work flows of the modules.
By adopting the penetration test tool constructed by the invention, safety testers can quickly and efficiently prepare safety compliance check items by simply defining input and output and result judging rules, the test coverage rate of interfaces of a service system is improved, and the test time is greatly shortened.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention and is not intended to limit the present invention, but although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the technical solutions described in the foregoing embodiments, or equivalents may be substituted for some of the technical features thereof. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (1)

1. An open safety compliance penetration testing system, comprising: the system comprises a data packet analysis module, an automatic fuzz engine, a custom payload module, a report generation module and a work scheduling module;
wherein the data packet analysis module: inputting an http protocol data packet in a txt text format, and analyzing the http protocol data packet into structural data for testing by the module;
wherein the fuzz engine is automated: the method comprises the steps of establishing connection between a socket and a service interface, simultaneously establishing a plurality of socket requests by using an asynchronous calling method, continuously creating a transmitted data packet by a CPU during the period of waiting for data return of a network, and calling back a result processing function when the data is required to be returned, so as to prevent the CPU from blocking and waiting in a network IO and maximally utilizing the CPU and bandwidth resources;
wherein the custom payload module: the rule input template is defined, and a user can quickly generate the safety compliance rule only by simple definition;
wherein the report generation module: a report format required by a penetration test result is rapidly generated; the test result is stored in a markdown text form, and can be quickly rendered by using a result command;
the work scheduling module: the system comprises a parameter analysis, an automatic operation scheduling function, and workflow coordination data packet analysis module, an automatic fuzz engine, a custom payload module and a report generation module.
CN202010357357.0A 2020-04-29 2020-04-29 Open type safety compliance penetration test system Active CN111552645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010357357.0A CN111552645B (en) 2020-04-29 2020-04-29 Open type safety compliance penetration test system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010357357.0A CN111552645B (en) 2020-04-29 2020-04-29 Open type safety compliance penetration test system

Publications (2)

Publication Number Publication Date
CN111552645A CN111552645A (en) 2020-08-18
CN111552645B true CN111552645B (en) 2023-05-12

Family

ID=72003295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010357357.0A Active CN111552645B (en) 2020-04-29 2020-04-29 Open type safety compliance penetration test system

Country Status (1)

Country Link
CN (1) CN111552645B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681126A (en) * 2015-12-30 2016-06-15 合一网络技术(北京)有限公司 Automatic test method and system based on protocol interface
CN105740148A (en) * 2016-01-29 2016-07-06 博雅网信(北京)科技有限公司 Script engine system of mobile terminal automation test and testing method
CN108737425A (en) * 2018-05-24 2018-11-02 北京凌云信安科技有限公司 Fragility based on multi engine vulnerability scanning association analysis manages system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090271214A1 (en) * 2008-04-29 2009-10-29 Affiliated Computer Services, Inc. Rules engine framework

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681126A (en) * 2015-12-30 2016-06-15 合一网络技术(北京)有限公司 Automatic test method and system based on protocol interface
CN105740148A (en) * 2016-01-29 2016-07-06 博雅网信(北京)科技有限公司 Script engine system of mobile terminal automation test and testing method
CN108737425A (en) * 2018-05-24 2018-11-02 北京凌云信安科技有限公司 Fragility based on multi engine vulnerability scanning association analysis manages system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈晓梅 ; 田洋 ; 王宝生 ; .基于AX4000的路由器用户自定义报文性能测试设计与实现.计算机工程与科学.2011,(01),全文. *

Also Published As

Publication number Publication date
CN111552645A (en) 2020-08-18

Similar Documents

Publication Publication Date Title
CN105335293B (en) A kind of automatization test system and method based on interface concurrent
US10701097B2 (en) Application security testing
CN103198009B (en) A kind of universal testing method, system and related device
CN107105009B (en) Job scheduling method and device for butting workflow engine based on Kubernetes system
US20170075790A1 (en) Integrating quality analysis with a code review tool
CN106095677A (en) The RESTful Webservice automatic interface testing method realized based on Robot Framework
CN111444111A (en) Performance testing method and device based on python, computer equipment and storage medium
CN111209166B (en) Automatic inspection system for B/S architecture service system
CN103856467A (en) Method and distributed system for achieving safety scanning
US20200117587A1 (en) Log File Analysis
CN106484425B (en) A kind of abnormality eliminating method of policy-based configuration
CN106855844B (en) Performance test method and system
CN106972983B (en) Automatic testing device and method for network interface
CN115328758A (en) Performance test method and system for large data volume of industrial software
CN114172835A (en) Automatic testing method of Bluetooth digital key
CN114039899B (en) Method for realizing network performance test of WEB product based on Fiddler tool
CN110232013B (en) Test method, test device, controller and medium
CN111552645B (en) Open type safety compliance penetration test system
KR20050034661A (en) Automatic testing system for mobile software and service
CN111680288B (en) Container command execution method, device, equipment and storage medium
CN110768860B (en) Test method, test device and electronic equipment
CN113037526A (en) Security detection method, terminal, system and storage medium
Wu et al. The study on an intelligent general-purpose automated software testing suite
CN115550228A (en) Internet of vehicles bus communication network test method and system
CN114661592A (en) Software testing method based on version iteration adaptive to rapid demand

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant