CN112000958A - Method and device for detecting logic bugs during application program login and storage medium - Google Patents

Method and device for detecting logic bugs during application program login and storage medium Download PDF

Info

Publication number
CN112000958A
CN112000958A CN202011175523.1A CN202011175523A CN112000958A CN 112000958 A CN112000958 A CN 112000958A CN 202011175523 A CN202011175523 A CN 202011175523A CN 112000958 A CN112000958 A CN 112000958A
Authority
CN
China
Prior art keywords
application program
login
information
detected
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011175523.1A
Other languages
Chinese (zh)
Inventor
张兵
万振华
王颉
董燕
李华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kaiyuan Internet Security Technology Co Ltd
Original Assignee
Shenzhen Kaiyuan Internet Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kaiyuan Internet Security Technology Co Ltd filed Critical Shenzhen Kaiyuan Internet Security Technology Co Ltd
Priority to CN202011175523.1A priority Critical patent/CN112000958A/en
Publication of CN112000958A publication Critical patent/CN112000958A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1078Logging; Metering

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a method, a device and a storage medium for detecting a logic bug during application program login, wherein the method comprises the following steps: acquiring original login request information of an application program to be detected; setting specific variable value information related to the safety of the application program to be detected in the original login request information; forming random value information based on the specific variable value information for multiple times, replacing the specific variable value information with the random value information, and generating new specific variable value information and new login request information; simulating a scene related to the safety of the application program to be detected to repeat the request based on the new login request information to obtain a new request response result corresponding to the new login request information; and analyzing the new request response result to obtain the logic bug of the application program to be detected. The method and the device can realize comprehensive coverage of various safety conditions of the application program to be detected, and greatly improve the use safety of the application program.

Description

Method and device for detecting logic bugs during application program login and storage medium
Technical Field
The present invention relates to the field of application detection technologies, and in particular, to a method and an apparatus for detecting a logic vulnerability during login of an application, and a storage medium.
Background
An application, which refers to a computer program for performing one or more specific tasks, operates in a user mode, is capable of interacting with a user, and has a visual user interface. Taking the Tencent qq as an example, qq music, qq farms, qq landlors, etc. all belong to the application.
Currently, most applications include a login behavior, and when a user logs in a certain application, the application usually exhibits some logic bugs, such as: when a user logs in an application program through a password with low security, if the account information of the user is not encrypted, other people can crack the account information of the user by trying some simple passwords; when a user inputs wrong password information, if the account is not locked by the relevant platform, other people can frequently use different password information to log in so as to crack the account of the user; the application program displays targeted prompt information aiming at the wrong account or password input by the user, so that other users can crack the account or password of the user one by one according to the targeted prompt information, and the like. For the user, the above logic bugs of the application programs cannot guarantee the security of the account number, the password and the user information of the user, and thus the use security of the application programs is low. The effect of improving the use safety of the application program by the existing detection method of the logic loophole during the login of some application programs is not obvious.
Therefore, there is a need for an improved method for detecting a logical vulnerability during application login.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the utility model provides a detection method, a device, a detection device and a storage medium of logic loophole when logging in an application program, aiming at solving the problem of low use safety of the application program.
In order to solve the technical problems, the invention adopts the technical scheme that:
a first aspect of an embodiment of the present invention provides a method for detecting a logic vulnerability during login of an application program, including:
acquiring original login request information of an application program to be detected;
setting specific variable value information related to the safety of the application program to be detected in the original login request information;
forming random value information based on the specific variable value information for multiple times, replacing the specific variable value information with the random value information, and generating new specific variable value information and new login request information;
simulating a scene related to the safety of the application program to be detected to carry out request retransmission based on the new login request information to obtain a new request response result corresponding to the new login request information;
and analyzing the new request response result to obtain the logic loophole of the application program to be detected.
In some embodiments, the analyzing the new request response result to obtain the logic vulnerability of the application to be detected specifically includes:
acquiring an original request response result corresponding to the original login request information;
and comparing the new request response result with the original request response result to obtain the logic bug of the application program to be detected.
In some embodiments, the obtaining of the original request response result corresponding to the original login request information specifically includes: and acquiring an original request response result corresponding to the original login request information by utilizing an internet probe technology.
In some embodiments, after obtaining an original request response result corresponding to the original login request information by using the internet probe technology, the method further includes: and storing the original request response result.
In some embodiments, the obtaining of the original login request information of the application to be detected specifically includes: and acquiring original login request information of the application program to be detected by utilizing an internet probe technology.
In some embodiments, after obtaining the original login request information of the application to be detected by using the internet probe technology, the method further includes: and storing the original login request information.
In some embodiments, the specific variable value information includes at least: user name information, password information, and the number of allowed login failures.
A second aspect of the present invention provides a device for detecting a logic vulnerability during login of an application, including:
the acquisition module is used for acquiring original login request information of the application program to be detected;
the setting module is used for setting specific variable value information related to the safety of the application program to be detected in the original login request information;
the generation module is used for forming random value information based on the specific variable value information for multiple times, replacing the specific variable value information with the random value information and generating new specific variable value information and new login request information;
the retransmission module is used for simulating a scene related to the safety of the application program to be detected to perform request retransmission based on the new login request information to obtain a new request response result corresponding to the new login request information;
and the analysis module is used for analyzing the new request response result to obtain the logic loophole of the application program to be detected.
A third aspect of the present invention provides a device for detecting a logic vulnerability during login of an application program, including: a storage device for storing one or more programs and one or more processors, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform.
A fourth aspect of embodiments of the present invention provides a computer-readable storage medium having stored thereon executable instructions that, when executed, perform a method according to the first aspect of embodiments of the present invention.
From the above description, compared with the prior art, the invention has the following beneficial effects:
the method comprises the steps of setting specific variable value information related to the safety of an application program to be detected in original login request information of the application program to be detected, and replacing the specific variable value information with random value information formed based on the specific variable value information for multiple times to obtain multiple different new login request information, so that the comprehensive coverage of various safety conditions of the application program to be detected is achieved. And then, a plurality of new login request information is utilized to carry out request retransmission to obtain a plurality of new request response results, and finally, the logic loophole of the application program to be detected is obtained by analyzing the plurality of new request response results, so that the use safety of the application program is greatly improved. Because the information of the plurality of specific variable values is related to the safety of the application program to be detected (different information of the specific variable values correspond to different or same safety conditions of the application program to be detected), the corresponding logic problems can be detected more accurately and efficiently by aiming at the different information of the specific variable values. In addition, the method is based on a plurality of simple steps and has the characteristic of simplicity.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is to be understood that the drawings in the following description are of some, but not all, embodiments of the invention. For a person skilled in the art, other figures can also be obtained from the provided figures without inventive effort.
Fig. 1 is a schematic flowchart of a method for detecting a logic vulnerability during login of an application according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of step S5 in fig. 1 according to an embodiment of the present invention;
fig. 3 is a block diagram of a device for detecting a logical vulnerability during login of an application according to an embodiment of the present invention;
fig. 4 is a block diagram of a device for detecting a logical vulnerability during login of an application according to an embodiment of the present invention;
fig. 5 is a block diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
For purposes of promoting a clear understanding of the objects, aspects and advantages of the invention, reference will now be made in detail to the present embodiments of the invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements throughout. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example 1
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a method for detecting a logic bug during login of an application according to an embodiment of the present invention.
As shown in fig. 1, a first embodiment of the present invention provides a method for detecting a logic bug during login of an application, including the following steps S1 to S5.
S1, acquiring original login request information of the application program to be detected;
the original login request information of the application program to be detected is acquired by using the Internet probe technology, and is stored after the original login request information is acquired, so that the application program to be detected can be conveniently checked by a detection person in the future.
S2, setting specific variable value information related to the safety of the application program to be detected in the original login request information;
it should be understood that the specific variable value information is related to the security of the application to be tested, including but not limited to username information, password information, and the number of allowed login failures.
S3, forming random value information based on the specific variable value information for many times, replacing the specific variable value information with the random value information, and generating new specific variable value information and new login request information;
here, when random value information is formed based on specific variable value information, the random value information is performed for a plurality of times, so that a plurality of different specific variable value information can be obtained conveniently to correspond to a plurality of security conditions of the application program to be detected.
S4, simulating a scene related to the safety of the application program to be detected to repeat the request based on the new login request information, and obtaining a new request response result corresponding to the new login request information;
it should be understood that scenarios related to the security of the application to be detected include, but are not limited to, incorrect account or password information, login times exceeding a preset number, and other login failures.
And S5, analyzing the new request response result to obtain the logic loophole of the application program to be detected.
In the method for detecting a logic vulnerability during application program login provided in the first embodiment of the present invention, specific variable value information related to the security of the application program to be detected is set in the original login request information of the application program to be detected, and random value information formed based on the specific variable value information is used to replace the specific variable value information for multiple times, so as to obtain multiple different new login request information, thereby implementing comprehensive coverage of various security conditions of the application program to be detected. And then, a plurality of new login request information is utilized to carry out request retransmission to obtain a plurality of new request response results, and finally, the logic loophole of the application program to be detected is obtained by analyzing the plurality of new request response results, so that the use safety of the application program is greatly improved. Because the information of the plurality of specific variable values is related to the safety of the application program to be detected (different information of the specific variable values correspond to different or same safety conditions of the application program to be detected), the corresponding logic problems can be detected more accurately and efficiently by aiming at the different information of the specific variable values. In addition, the embodiment is based on a plurality of simple steps and has the characteristic of simplicity.
Example 2
Referring to fig. 2, fig. 2 is a flowchart illustrating step S5 in fig. 1 according to an embodiment of the present invention.
Compared with the method for detecting a logic vulnerability during login of an application program provided by the first embodiment of the present invention, the second embodiment of the present invention designs step S5 in detail.
As shown in fig. 2, step S5 specifically includes the following steps S51 to S53.
S51, acquiring an original request response result corresponding to the original login request information;
here, an original request response result corresponding to the original login request information is acquired using the internet probe technology.
S52, storing the original request response result;
here, the original request response result is stored, so that the detection personnel can conveniently check the request in the future.
And S53, comparing the new request response result with the original request response result to obtain the logic loophole of the application program to be detected.
Example 3
Referring to fig. 3, fig. 3 is a block diagram of an apparatus for detecting a logic bug during application login according to an embodiment of the present invention.
As shown in fig. 3, corresponding to the method for detecting a logic bug during application program login provided in the first embodiment of the present invention, a third embodiment of the present invention provides an apparatus 100 for detecting a logic bug during application program login, including:
an obtaining module 101, configured to obtain original login request information of an application to be detected;
the setting module 102 is configured to set specific variable value information related to the security of the application program to be detected in the original login request information;
the generation module 103 is configured to form random value information based on the specific variable value information for multiple times, replace the specific variable value information with the random value information, and generate new specific variable value information and new login request information;
the retransmission module 104 is configured to simulate a scene related to the security of the application program to be detected to perform request retransmission based on the new login request information, and obtain a new request response result corresponding to the new login request information;
and the analysis module 105 is configured to analyze the new request response result to obtain a logic vulnerability of the application program to be detected.
Example 4
Referring to fig. 4, fig. 4 is a block diagram of a device for detecting a logical vulnerability during login of an application according to an embodiment of the present invention.
As shown in fig. 4, a fourth embodiment of the present invention provides a device 200 for detecting a logic vulnerability during application program login, including a storage 201 and one or more processors 202, where the storage 201 is used to store one or more programs, and when the one or more programs are executed by the one or more processors 202, the one or more processors 202 are caused to execute the method according to any one of the first to second embodiments of the present invention.
It should be noted that the detection apparatus 200 for a logic bug during application login provided by this embodiment further includes a bus 203 for communication connection between the storage device 201 and the one or more processors 202.
Example 5
Referring to fig. 5, fig. 5 is a block diagram of a computer-readable storage medium according to an embodiment of the present invention.
As shown in fig. 5, a fifth embodiment of the present invention provides a computer-readable storage medium 300, where the computer-readable storage medium 300 has stored thereon executable instructions 301, and the executable instructions 301 when executed perform the method according to any one of the first to second embodiments of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk), among others.
It should be noted that, in the summary of the present invention, each embodiment is described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the method class embodiment, since it is similar to the product class embodiment, the description is simple, and the relevant points can be referred to the partial description of the product class embodiment.
It is further noted that, in the present disclosure, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined in this disclosure may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for detecting a logic vulnerability during application program login is characterized by comprising the following steps:
acquiring original login request information of an application program to be detected;
setting specific variable value information related to the safety of the application program to be detected in the original login request information;
forming random value information based on the specific variable value information for multiple times, replacing the specific variable value information with the random value information, and generating new specific variable value information and new login request information;
simulating a scene related to the safety of the application program to be detected to carry out request retransmission based on the new login request information to obtain a new request response result corresponding to the new login request information;
and analyzing the new request response result to obtain the logic loophole of the application program to be detected.
2. The method for detecting a logic vulnerability during application program login according to claim 1, wherein the analyzing the new request response result to obtain the logic vulnerability of the application program to be detected specifically comprises:
acquiring an original request response result corresponding to the original login request information;
and comparing the new request response result with the original request response result to obtain the logic bug of the application program to be detected.
3. The method for detecting a logic vulnerability during application program login according to claim 2, wherein the obtaining of the original request response result corresponding to the original login request information specifically comprises: and acquiring an original request response result corresponding to the original login request information by utilizing an internet probe technology.
4. The method for detecting a logic vulnerability during application program login according to claim 3, wherein after obtaining an original request response result corresponding to the original login request information by using an internet probe technology, the method further comprises: and storing the original request response result.
5. The method for detecting a logic vulnerability during application program login according to claim 1, wherein the obtaining of original login request information of an application program to be detected specifically comprises: and acquiring original login request information of the application program to be detected by utilizing an internet probe technology.
6. The method for detecting the logic vulnerability during application program login according to claim 5, wherein after acquiring the original login request information of the application program to be detected by using the internet probe technology, the method further comprises: and storing the original login request information.
7. The method for detecting a logic vulnerability at login of an application program according to claim 1, wherein the specific variable value information at least comprises: user name information, password information, and the number of allowed login failures.
8. An apparatus for detecting a logical vulnerability during application login, comprising:
the acquisition module is used for acquiring original login request information of the application program to be detected;
the setting module is used for setting specific variable value information related to the safety of the application program to be detected in the original login request information;
the generation module is used for forming random value information based on the specific variable value information for multiple times, replacing the specific variable value information with the random value information and generating new specific variable value information and new login request information;
the retransmission module is used for simulating a scene related to the safety of the application program to be detected to perform request retransmission based on the new login request information to obtain a new request response result corresponding to the new login request information;
and the analysis module is used for analyzing the new request response result to obtain the logic loophole of the application program to be detected.
9. An apparatus for detecting a logical vulnerability at application login, comprising: a storage device to store one or more programs, and one or more processors to cause the one or more processors to perform the method of any one of claims 1-7 when the one or more programs are executed by the one or more processors.
10. A computer-readable storage medium having stored thereon executable instructions that, when executed, perform the method of any one of claims 1-7.
CN202011175523.1A 2020-10-29 2020-10-29 Method and device for detecting logic bugs during application program login and storage medium Pending CN112000958A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011175523.1A CN112000958A (en) 2020-10-29 2020-10-29 Method and device for detecting logic bugs during application program login and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011175523.1A CN112000958A (en) 2020-10-29 2020-10-29 Method and device for detecting logic bugs during application program login and storage medium

Publications (1)

Publication Number Publication Date
CN112000958A true CN112000958A (en) 2020-11-27

Family

ID=73475210

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011175523.1A Pending CN112000958A (en) 2020-10-29 2020-10-29 Method and device for detecting logic bugs during application program login and storage medium

Country Status (1)

Country Link
CN (1) CN112000958A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114938291A (en) * 2022-04-25 2022-08-23 深圳开源互联网安全技术有限公司 Method and system for detecting user identity verification vulnerability in application program

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114938291A (en) * 2022-04-25 2022-08-23 深圳开源互联网安全技术有限公司 Method and system for detecting user identity verification vulnerability in application program

Similar Documents

Publication Publication Date Title
US10740411B2 (en) Determining repeat website users via browser uniqueness tracking
US20180046475A1 (en) Detecting scripted or otherwise anomalous interactions with social media platform
US20210400075A1 (en) Determining risk metrics for access requests in network environments using multivariate modeling
US8839351B2 (en) Effective testing of authorization logic of web components which utilize claims-based authorization
US10523699B1 (en) Privilege escalation vulnerability detection using message digest differentiation
US11381598B2 (en) Phishing detection using certificates associated with uniform resource locators
US20140006507A1 (en) Dynamic Security Question Compromise Checking Based on Incoming Social Network Postings
US20180198773A1 (en) Systems and methods for automated detection of login sequence for web form-based authentication
KR101530941B1 (en) Method, system and client terminal for detection of phishing websites
US20210203692A1 (en) Phishing detection using uniform resource locators
US20180131779A1 (en) Recording And Triggering Web And Native Mobile Application Events With Mapped Data Fields
US9262309B2 (en) Optimizing test data payload selection for testing computer software applications that employ data sanitizers and data validators
CN109376534B (en) Method and apparatus for detecting applications
US20210203693A1 (en) Phishing detection based on modeling of web page content
WO2019144548A1 (en) Security test method, apparatus, computer device and storage medium
US9923916B1 (en) Adaptive web application vulnerability scanner
CN115695012A (en) Login request processing method and device, electronic equipment and storage medium
CN109688109B (en) Verification method and device of verification code based on client information identification
US20230224325A1 (en) Distributed endpoint security architecture enabled by artificial intelligence
CN112000958A (en) Method and device for detecting logic bugs during application program login and storage medium
CN113362173A (en) Anti-duplication mechanism verification method, anti-duplication mechanism verification system, electronic equipment and storage medium
US20190347407A1 (en) Detecting client-side exploits in web applications
CN115643044A (en) Data processing method, device, server and storage medium
US11470114B2 (en) Malware and phishing detection and mediation platform
CN108848183B (en) Login method and device for simulation user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201127

RJ01 Rejection of invention patent application after publication