CN112416768A - Interactive security vulnerability detection method, system, device and readable storage medium - Google Patents

Interactive security vulnerability detection method, system, device and readable storage medium Download PDF

Info

Publication number
CN112416768A
CN112416768A CN202011318384.3A CN202011318384A CN112416768A CN 112416768 A CN112416768 A CN 112416768A CN 202011318384 A CN202011318384 A CN 202011318384A CN 112416768 A CN112416768 A CN 112416768A
Authority
CN
China
Prior art keywords
security vulnerability
http request
uniform identifier
security
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011318384.3A
Other languages
Chinese (zh)
Inventor
韩敏
董燕
万振华
王颉
李华
张晓翠
刘海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Siji Network Security Beijing Co ltd
State Grid Siji Testing Technology Beijing Co ltd
State Grid Information and Telecommunication Co Ltd
Shenzhen Kaiyuan Internet Security Technology Co Ltd
Original Assignee
State Grid Siji Network Security Beijing Co ltd
State Grid Siji Testing Technology Beijing Co ltd
State Grid Information and Telecommunication Co Ltd
Shenzhen Kaiyuan Internet Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Siji Network Security Beijing Co ltd, State Grid Siji Testing Technology Beijing Co ltd, State Grid Information and Telecommunication Co Ltd, Shenzhen Kaiyuan Internet Security Technology Co Ltd filed Critical State Grid Siji Network Security Beijing Co ltd
Priority to CN202011318384.3A priority Critical patent/CN112416768A/en
Publication of CN112416768A publication Critical patent/CN112416768A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases

Abstract

The invention discloses an interactive security weakness detection method, a system, a device and a readable storage medium, wherein the method comprises the following steps: 1) a client sends an HTTP request, wherein a uniform identifier corresponding to a test case is added in the HTTP request; 2) the server side receives the HTTP request and carries out corresponding service processing so as to send corresponding information to the detection side; 3) the detection end carries out safety detection on the code running process during the function test according to the information sent by the server end; 4) when the security vulnerability is detected, acquiring the uniform identifier in the HTTP request and establishing the corresponding relation between the security vulnerability and the uniform identifier. The invention can position which test case the detected security weakness appears by executing, and further can carry out rapid verification after the security weakness is repaired.

Description

Interactive security vulnerability detection method, system, device and readable storage medium
Technical Field
The invention relates to the technical field of computers, in particular to an interactive security weakness detection method, system and device and a readable storage medium.
Background
In the current software test, the test case is used as the execution and detection standard of the test when the test is implemented, guides the implementation of the test behavior, and quantifies the mode of the test process. Typically, a full-function test of a product needs to be covered by hundreds or thousands of test cases. The problem detected by the conventional function test is usually associated with a certain test case, so that the test range during verification can be quickly defined after the problem is repaired, and the effect of quick verification is achieved.
The interactive security vulnerability detection tool is generally used for automatically detecting security vulnerabilities, i.e. vulnerabilities in general, in this case, the detection performed by the background, the security problem is reported automatically in the automatic detection process, the operation of the functional test is continuously carried out at the front end, so that the detected safety problem is difficult to be positioned to the case which is executed by the functional test, and subsequently, if the safety problem is developed and repaired, the tester cannot verify whether the problem is correctly repaired by accurately executing a specific test case, and multiple or even all test cases must be executed again to verify the problem, so that a large amount of labor and time cost is wasted, and the difficulty in implementing the verification process of the security weakness is high.
Disclosure of Invention
The invention aims to provide an interactive security weakness detection method, system, device and readable storage medium, which can locate which test case the detected security weakness appears when the detected security weakness is executed, and can further perform rapid verification after the security weakness is repaired.
In order to achieve the above object, the present invention provides an interactive security vulnerability detection method, which comprises the following steps:
1) a client sends an HTTP request, wherein a uniform identifier corresponding to a test case is added in the HTTP request;
2) the server side receives the HTTP request and carries out corresponding service processing so as to send corresponding information to the detection side;
3) the detection end carries out safety detection on the code running process during the function test according to the information sent by the server end;
4) when the security vulnerability is detected, acquiring the uniform identifier in the HTTP request and establishing the corresponding relation between the security vulnerability and the uniform identifier.
Specifically, after the step 4), the method further comprises the following steps: and the detection end sends the corresponding relation between the security weak point and the uniform identifier to the server end for storage.
Specifically, after the detecting end sends the correspondence between the security weak point and the uniform identifier to the server end for storage, the method further includes:
and sending the corresponding relation between the security weak point and the uniform identifier to a display end.
In order to achieve the above object, the present invention further provides an interactive security vulnerability detection method, which includes the following steps:
1) carrying out safety detection on a code running process during function test according to an HTTP request of a client, wherein a uniform identifier corresponding to a test case is added in the HTTP request;
2) when the security vulnerability is detected, acquiring the uniform identifier in the HTTP request and establishing the corresponding relation between the security vulnerability and the uniform identifier.
Specifically, after the step 2), the method further comprises the following steps: and sending the corresponding relation between the security weak point and the uniform identifier to the server side.
To achieve the above object, the present invention further provides an interactive security vulnerability detection system, comprising:
the detection module is used for carrying out safety detection on a code running process during function test according to an HTTP request of a client, wherein a uniform identifier corresponding to a test case is added in the HTTP request;
and the acquisition module is used for acquiring the uniform identifier in the HTTP request and establishing the corresponding relation between the security weakness and the uniform identifier when the security weakness is detected.
Specifically, the interactive security vulnerability detection system further comprises:
and the sending module is used for sending the corresponding relation between the security weakness and the uniform identifier to the server side.
In order to achieve the above object, the present invention further provides an interactive security vulnerability detection apparatus, including:
a processor;
a memory having stored therein executable instructions of the processor;
wherein the processor is configured to perform the interactive security vulnerability detection method as described above via execution of the executable instructions.
To achieve the above object, the present invention also provides a readable storage medium having a program stored thereon, which when executed by a processor, implements the interactive security vulnerability detection method as described above.
Compared with the prior art, the uniform identifier corresponding to the test case is added in the HTTP request sent during the function test, and when the security weakness is detected, the detection end can acquire the uniform identifier in the HTTP request and establish the corresponding relation between the security weakness and the uniform identifier. Therefore, when the security weakness is detected, which test case is used for executing the security weakness can be accurately positioned, and after the security weakness is repaired, the test case can be directly used for verification, the verification mode is simple and quick, a large amount of labor, time and cost can be saved, and the current situation that the current security weakness is difficult to verify after being repaired is solved.
Drawings
Fig. 1 is a flowchart of an interactive security vulnerability detection method according to an embodiment of the present invention.
Fig. 2 is a flowchart of an interactive security vulnerability detection method according to another embodiment of the present invention.
Fig. 3 is a schematic block diagram of an interactive security vulnerability detection system in accordance with an embodiment of the present invention.
Fig. 4 is another schematic block diagram of an interactive security vulnerability detection system, in accordance with an embodiment of the present invention.
Fig. 5 is a schematic block diagram of an interactive security vulnerability detection apparatus according to an embodiment of the present invention.
Detailed Description
In order to explain technical contents, structural features, and objects and effects of the present invention in detail, the following detailed description is given with reference to the accompanying drawings in conjunction with the embodiments.
Example one
Referring to fig. 1, the present invention discloses an interactive security vulnerability detection method, which includes the following steps:
101. the client sends an HTTP request, and a uniform identifier (such as 'CASE _ ID: test _ 00001') corresponding to the test CASE is added in the HTTP request. The "uniform identifier" in the present invention refers to an identifier unique to each test case. In a conventional functional test or automation script, each test CASE has a corresponding number (e.g., "CASE _ ID"), which can be used as a uniform identifier of the test CASE.
102. And the server side receives the HTTP request and performs corresponding service processing to send corresponding information to the detection side.
103. And the detection end carries out safety detection on the code running process during the function test according to the information sent by the server end.
104. When the security vulnerability is detected, the uniform identifier in the HTTP request is obtained, and the corresponding relation between the security vulnerability and the uniform identifier is established.
The improvement of the invention lies in that: adding a uniform identifier corresponding to the test case into the HTTP request, and establishing a corresponding relation between the uniform identifier and the security vulnerability when the security vulnerability is detected. The specific detection method and the specific transmission method of information are known to those skilled in the art, and the detailed description of the present invention is omitted here.
The interactive security vulnerability detection method adds the uniform identifier corresponding to the test case in the HTTP request sent during the function test, and when the security vulnerability is detected, the detection end can acquire the uniform identifier in the HTTP request and establish the corresponding relationship between the security vulnerability and the uniform identifier. Therefore, when the security weakness is detected, which test case is used for executing the security weakness can be accurately positioned, and after the security weakness is repaired, the test case can be directly used for verification, the verification mode is simple and quick, a large amount of labor, time and cost can be saved, and the current situation that the current security weakness is difficult to verify after being repaired is solved.
Specifically, after step 104, the method further includes: and the detection end sends the corresponding relation between the security weak point and the uniform identifier to the server end for storage.
Specifically, after the detecting end sends the correspondence between the security weak point and the uniform identifier to the server end for storage, the method further includes:
and sending the corresponding relation between the security weak point and the uniform identifier to a display end.
By means of the technical means, the testing personnel can conveniently check the detection condition of the installation weakness.
Example two
Referring to fig. 2, the present invention discloses an interactive security vulnerability detection method, which includes the following steps:
201. carrying out safety detection on a code running process during function test according to an HTTP request of a client, wherein a uniform identifier corresponding to a test case is added in the HTTP request;
202. when the security vulnerability is detected, the uniform identifier in the HTTP request is obtained, and the corresponding relation between the security vulnerability and the uniform identifier is established.
When the interactive security weakness detection method detects security weakness, the detection end can acquire the uniform identifier preset in the HTTP request and establish the corresponding relation between the security weakness and the uniform identifier. Therefore, when the security weakness is detected, which test case is used for executing the security weakness can be accurately positioned, and after the security weakness is repaired, the test case can be directly used for verification, the verification mode is simple and quick, a large amount of labor, time and cost can be saved, and the current situation that the current security weakness is difficult to verify after being repaired is solved.
Specifically, after step 202, the method further includes: and sending the corresponding relation between the security weak point and the uniform identifier to a server side.
EXAMPLE III
Referring to fig. 3, the present invention also discloses an interactive security vulnerability detection system, which includes:
the detection module 300 is configured to perform security detection on a code running process during a function test according to an HTTP request of a client, where a uniform identifier corresponding to a test case is added to the HTTP request;
an obtaining module 400, configured to, when a security vulnerability is detected, obtain the uniform identifier in the HTTP request and establish a correspondence between the security vulnerability and the uniform identifier.
When the interactive security vulnerability detection system detects security vulnerabilities, the uniform identifiers preset in HTTP requests are obtained, and the corresponding relation between the security vulnerabilities and the uniform identifiers is established. Therefore, when the security weakness is detected, which test case is used for executing the security weakness can be accurately positioned, and after the security weakness is repaired, the test case can be directly used for verification, the verification mode is simple and quick, a large amount of labor, time and cost can be saved, and the current situation that the current security weakness is difficult to verify after being repaired is solved.
Referring to fig. 4, in particular, the interactive security vulnerability detection system further includes:
a sending module 500, configured to send the correspondence between the security vulnerability and the uniform identifier to the server.
Example four
Referring to fig. 2 and 5, the present invention discloses an interactive security vulnerability detection apparatus, which includes:
a processor 60;
a memory 70 having stored therein executable instructions of the processor 60;
wherein the processor 60 is configured to perform the interactive security vulnerability detection method as described in embodiment two via execution of executable instructions.
EXAMPLE five
Referring to fig. 2, the present invention discloses a readable storage medium, on which a program is stored, and the program, when executed by a processor, implements the method for detecting the interactive security vulnerability according to the second embodiment.
The above disclosure is only a preferred embodiment of the present invention, and should not be taken as limiting the scope of the invention, so that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.

Claims (9)

1. An interactive security vulnerability detection method, characterized by comprising the steps of:
1) a client sends an HTTP request, wherein a uniform identifier corresponding to a test case is added in the HTTP request;
2) the server side receives the HTTP request and carries out corresponding service processing so as to send corresponding information to the detection side;
3) the detection end carries out safety detection on the code running process during the function test according to the information sent by the server end;
4) when the security vulnerability is detected, acquiring the uniform identifier in the HTTP request and establishing the corresponding relation between the security vulnerability and the uniform identifier.
2. The interactive security vulnerability detection method of claim 1, characterized in that after step 4), further comprising: and the detection end sends the corresponding relation between the security weak point and the uniform identifier to the server end for storage.
3. The interactive security vulnerability detection method of claim 2, wherein after the detecting end sends the correspondence between the security vulnerability and the uniform identifier to the server-side storage, further comprising:
and sending the corresponding relation between the security weak point and the uniform identifier to a display end.
4. An interactive security vulnerability detection method, characterized by comprising the steps of:
1) carrying out safety detection on a code running process during function test according to an HTTP request of a client, wherein a uniform identifier corresponding to a test case is added in the HTTP request;
2) when the security vulnerability is detected, acquiring the uniform identifier in the HTTP request and establishing the corresponding relation between the security vulnerability and the uniform identifier.
5. The interactive security vulnerability detection method of claim 1, after step 2), further comprising: and sending the corresponding relation between the security weak point and the uniform identifier to the server side.
6. An interactive security vulnerability detection system, comprising:
the detection module is used for carrying out safety detection on a code running process during function test according to an HTTP request of a client, wherein a uniform identifier corresponding to a test case is added in the HTTP request;
and the acquisition module is used for acquiring the uniform identifier in the HTTP request and establishing the corresponding relation between the security weakness and the uniform identifier when the security weakness is detected.
7. The interactive security vulnerability detection system of claim 6, further comprising:
and the sending module is used for sending the corresponding relation between the security weakness and the uniform identifier to the server side.
8. An interactive security vulnerability detection apparatus, comprising:
a processor;
a memory having stored therein executable instructions of the processor;
wherein the processor is configured to perform the interactive security vulnerability detection method of claim 4 or 5 via execution of the executable instructions.
9. A readable storage medium on which a program is stored, the program, when executed by a processor, implementing the interactive security vulnerability detection method of claim 4 or 5.
CN202011318384.3A 2020-11-20 2020-11-20 Interactive security vulnerability detection method, system, device and readable storage medium Pending CN112416768A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011318384.3A CN112416768A (en) 2020-11-20 2020-11-20 Interactive security vulnerability detection method, system, device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011318384.3A CN112416768A (en) 2020-11-20 2020-11-20 Interactive security vulnerability detection method, system, device and readable storage medium

Publications (1)

Publication Number Publication Date
CN112416768A true CN112416768A (en) 2021-02-26

Family

ID=74778233

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011318384.3A Pending CN112416768A (en) 2020-11-20 2020-11-20 Interactive security vulnerability detection method, system, device and readable storage medium

Country Status (1)

Country Link
CN (1) CN112416768A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103020529A (en) * 2012-10-31 2013-04-03 中国航天科工集团第二研究院七○六所 Software vulnerability analytical method based on scene model
US20150058680A1 (en) * 2011-12-16 2015-02-26 Codenomicon Oy Network-based testing service and method of testing in a network
CN105204985A (en) * 2014-06-23 2015-12-30 腾讯科技(深圳)有限公司 Vulnerability detection method and device
CN106126417A (en) * 2016-06-17 2016-11-16 深圳开源互联网安全技术有限公司 Interactive application safety detecting method and system thereof
CN106302337A (en) * 2015-05-22 2017-01-04 腾讯科技(深圳)有限公司 leak detection method and device
CN109062794A (en) * 2018-07-24 2018-12-21 北京奇艺世纪科技有限公司 A kind of the determination method, apparatus and electronic equipment of software evaluating result
CN109947654A (en) * 2019-03-28 2019-06-28 上海连尚网络科技有限公司 The method and apparatus automatically updated for test case library
CN111859375A (en) * 2020-07-20 2020-10-30 百度在线网络技术(北京)有限公司 Vulnerability detection method and device, electronic equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150058680A1 (en) * 2011-12-16 2015-02-26 Codenomicon Oy Network-based testing service and method of testing in a network
CN103020529A (en) * 2012-10-31 2013-04-03 中国航天科工集团第二研究院七○六所 Software vulnerability analytical method based on scene model
CN105204985A (en) * 2014-06-23 2015-12-30 腾讯科技(深圳)有限公司 Vulnerability detection method and device
CN106302337A (en) * 2015-05-22 2017-01-04 腾讯科技(深圳)有限公司 leak detection method and device
CN106126417A (en) * 2016-06-17 2016-11-16 深圳开源互联网安全技术有限公司 Interactive application safety detecting method and system thereof
CN109062794A (en) * 2018-07-24 2018-12-21 北京奇艺世纪科技有限公司 A kind of the determination method, apparatus and electronic equipment of software evaluating result
CN109947654A (en) * 2019-03-28 2019-06-28 上海连尚网络科技有限公司 The method and apparatus automatically updated for test case library
CN111859375A (en) * 2020-07-20 2020-10-30 百度在线网络技术(北京)有限公司 Vulnerability detection method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110058998B (en) Software testing method and device
CN111211929A (en) Fault positioning method, fault positioning device, control equipment and intelligent equipment
CN111813696A (en) Application testing method, device and system and electronic equipment
CN112380542A (en) Internet of things firmware vulnerability mining method and system based on error scene generation
CN106972983B (en) Automatic testing device and method for network interface
CN113407458B (en) Interface testing method and device, electronic equipment and computer readable medium
CN113132522A (en) Test method, device, server and medium
CN110691090B (en) Website detection method, device, equipment and storage medium
CN112416768A (en) Interactive security vulnerability detection method, system, device and readable storage medium
CN111221727A (en) Test method, test device, electronic equipment and computer readable medium
US20200028733A1 (en) Method and apparatus for processing information
CN112948195B (en) Interface testing method, device, electronic equipment and storage medium
CN111666200A (en) Testing method and terminal for time consumption of cold start of PC software
CN115373984A (en) Code coverage rate determining method and device
CN115373929A (en) Test method, device, equipment, readable storage medium and program product
CN112615848B (en) Vulnerability repair state detection method and system
CN107645727B (en) Method and device for testing base station
CN114793181A (en) WAF (Wireless Access Filter) interception rule base testing method and device, electronic equipment and storage medium
CN109783263B (en) Method and system for processing aging test fault of server
CN111880958A (en) Zero terminal self-checking method and device
CN112363908A (en) Asynchronous interface test method, system, electronic device and storage medium
CN113037526A (en) Security detection method, terminal, system and storage medium
CN110896540A (en) Mobile internet client security assessment tool, method, computer device and storage medium
CN109214223B (en) Method and instrument for testing sensitivity of electronic tag reader-writer and storage medium
CN115250291B (en) Parameter data verification method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination