CN113949536A - Semi-automatic infiltration method based on open source project - Google Patents

Semi-automatic infiltration method based on open source project Download PDF

Info

Publication number
CN113949536A
CN113949536A CN202111128137.1A CN202111128137A CN113949536A CN 113949536 A CN113949536 A CN 113949536A CN 202111128137 A CN202111128137 A CN 202111128137A CN 113949536 A CN113949536 A CN 113949536A
Authority
CN
China
Prior art keywords
semi
open source
web
source project
infiltration method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111128137.1A
Other languages
Chinese (zh)
Inventor
张亚雄
赵敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong University
Original Assignee
Nantong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nantong University filed Critical Nantong University
Priority to CN202111128137.1A priority Critical patent/CN113949536A/en
Publication of CN113949536A publication Critical patent/CN113949536A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The invention discloses a semi-automatic infiltration method based on an open source project, which comprises the following steps: step S0. asset separating the IP and domain name in the destination file; s1, carrying out full-port scanning on the IP by using a massscan scanning mode so as to identify a port corresponding to the Web service; s2, combining the ports corresponding to the IP and the Web service to form a Web asset; and S3, calling a scanner by using the API (application programming interface) interface to scan the domain name and the Web asset so as to realize vulnerability mining. The semi-automatic infiltration method based on the open source project utilizes massscan to carry out full-port scanning on the IP address so as to carry out Web service identification, thereby improving the Web service identification speed and the overall efficiency of the whole semi-automatic infiltration method.

Description

Semi-automatic infiltration method based on open source project
Technical Field
The invention belongs to the field of penetration testing and vulnerability mining, and particularly relates to a semi-automatic penetration method based on an open source project.
Background
Penetration test (penetration test), a common statement that some security organizations abroad have agreed is: penetration testing is an evaluation method for evaluating the security of a computer network system by simulating the attack method of a malicious hacker. This process involves an active analysis of any vulnerability, technical flaw or vulnerability of the system from a location where an attacker may exist and conditionally exploit the security vulnerability.
Vulnerability mining (virtualization) is the core of the penetration testing process. In order to protect the net, the personnel who participate in the action can be helped to quickly discover and utilize the loophole in an early stage.
The Semi-automatic (Semi automation) infiltration method is an automatic mode for automatically performing work circulation under human intervention, the system needs Semi-automation, namely a part of steps need to be operated manually, and compared with full automation, the Semi-automatic infiltration method has the advantages that the result is more accurate and can better meet expected requirements, but the Web service identification related in the traditional Semi-automatic infiltration method has the problem of low speed, so that the overall efficiency of the whole Semi-automatic infiltration method is influenced.
Disclosure of Invention
In order to solve the problems, the invention provides a semi-automatic penetration method based on an open source project, which utilizes massscan (port scanning at the internet level) to carry out full-port scanning on an IP address so as to carry out Web service identification, thereby improving the Web service identification speed and improving the overall efficiency of the whole semi-automatic penetration method.
In order to achieve the above purpose, the invention adopts a technical scheme as follows:
a semi-automatic infiltration method based on an open source project comprises the following steps:
step S0. asset separating the IP and domain name in the destination file;
s1, carrying out full-port scanning on the IP by using a massscan scanning mode so as to identify a port corresponding to the Web service;
s2, combining the ports corresponding to the IP and the Web service to form a Web asset;
and S3, calling a scanner by using the API (application programming interface) interface to scan the domain name and the Web asset so as to realize vulnerability mining.
Further, the full port includes 1-65535.
Further, in step S3, a parallel mode is adopted when the scanner is used to scan the domain name and the Web asset.
Further, the scanner is an AWVS scanner.
Further, the semi-automated infiltration method further comprises the steps of:
and S5, outputting the vulnerability report corresponding to the domain name and the Web asset.
Compared with the prior art, the technical scheme of the invention has the following advantages:
the semi-automatic infiltration method based on the open source project provided by the invention utilizes massscan (port scanning at the internet level) to carry out full-port scanning on an IP address so as to carry out Web service identification, thereby improving the Web service identification speed; meanwhile, a parallel mode is adopted when the scanner is used for scanning the domain name and the Web asset, so that the time for the scanner to scan the domain name and the Web asset is greatly reduced, and the overall efficiency of the whole semi-automatic infiltration method is improved. The semi-automatic infiltration method based on the open source project has the characteristics of low cost, high speed and high efficiency, and is simple to operate.
Drawings
FIG. 1 is a flow chart of an open source project-based semi-automated infiltration method according to an embodiment of the present invention;
FIG. 2 is an algorithm diagram of a semi-automated infiltration method based on open source projects in an embodiment of the present invention;
FIG. 3 is a code screenshot of a scanner invoked with an API in an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings of the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1 and 2, a semi-automated infiltration method based on open source project includes the following steps:
step S0. asset separating the IP and domain name in the destination file; in practice, the target file not only contains the domain name but also an IP address, and the domain name can be directly mined by adopting a scanner; but the IP address can only know the corresponding open port of the Web service through port scanning, so that the separated IP and the domain name can be stored in different files;
s1, carrying out full-port scanning on the IP by using a massscan scanning mode so as to identify a port corresponding to the Web service; the traditional method generally adopts nmap scanning identification when carrying out port scanning on IP, and nma scanning has the defect of low speed, so that the invention adopts a masscan mode to carry out full-port scanning, and the masscan mode has the characteristics of high scanning speed, accurate result and difficulty in being perceived by a host of the other party and rejecting; the full port comprises 1-65535, and the full port scanning ensures the comprehensiveness of Web service identification because the port opened by the Web service can be defined by self;
s2, combining the ports corresponding to the IP and the Web service to form a Web asset; the combination is in a form of a port corresponding to IP + Web service, and one IP can have a plurality of ports corresponding to the Web service, so that the same IP can have a plurality of records, and Web assets can be generally stored in one file;
and S3, calling a scanner by using the API (application programming interface) interface to scan the domain name and the Web asset so as to realize vulnerability mining. As shown in fig. 3, generally, an AWVS scanner may be selected, and the call to the AWVS scanner is implemented by using an API interface in combination with a KEY value of the AWVS scanner, and generally, the AWVS scanner scans domain names and Web assets sequentially by one record, and the invention uses a parallel mode when the scanner scans the domain names and the Web assets, thereby greatly reducing the time for the scanner to scan the domain names and the Web assets. The AWVS scan can quickly scan out most common vulnerabilities of the target asset, such as WASP TOP 10.
Generally, after vulnerability mining of all domain names and Web assets is completed, vulnerability reports corresponding to the domain names and the Web assets need to be output. The vulnerability report analyzes vulnerability causes, verification processes and brought hazards, and provides a reasonable, efficient and safe solution for all generated problems; and the detailed payload or the utilization method and the detection statement are output together, and the repairing method is also output to help the website to put forward a repairing suggestion so as to repair the vulnerability in time.
In this embodiment, the method can be implemented by using a phthon language.
The above examples are merely illustrative of several embodiments of the present invention, which are described in more detail and detail but are not to be construed as limiting the scope of the present invention. Various modifications and alterations to this invention will become apparent to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (5)

1. A semi-automatic infiltration method based on an open source project is characterized by comprising the following steps:
step S0. asset separating the IP and domain name in the destination file;
s1, carrying out full-port scanning on the IP by using a massscan scanning mode so as to identify a port corresponding to the Web service;
s2, combining the ports corresponding to the IP and the Web service to form a Web asset;
and S3, calling a scanner by using the API (application programming interface) interface to scan the domain name and the Web asset so as to realize vulnerability mining.
2. The open source project-based semi-automated infiltration method of claim 1, wherein the full port comprises 1-65535.
3. The semi-automated penetration method based on open source project of claim 1, wherein the step S3 adopts a parallel mode when scanning the domain name and the Web asset by the scanner.
4. The open-source project-based semi-automated penetration method of claim 3, wherein the scanner is an AWVS scanner.
5. The open source project based semi-automated infiltration method according to claim 1, characterized in that it further comprises the following steps:
and S5, outputting the vulnerability report corresponding to the domain name and the Web asset.
CN202111128137.1A 2021-09-26 2021-09-26 Semi-automatic infiltration method based on open source project Pending CN113949536A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111128137.1A CN113949536A (en) 2021-09-26 2021-09-26 Semi-automatic infiltration method based on open source project

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111128137.1A CN113949536A (en) 2021-09-26 2021-09-26 Semi-automatic infiltration method based on open source project

Publications (1)

Publication Number Publication Date
CN113949536A true CN113949536A (en) 2022-01-18

Family

ID=79328636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111128137.1A Pending CN113949536A (en) 2021-09-26 2021-09-26 Semi-automatic infiltration method based on open source project

Country Status (1)

Country Link
CN (1) CN113949536A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948343A (en) * 2019-03-13 2019-06-28 杭州数梦工场科技有限公司 Leak detection method, Hole Detection device and computer readable storage medium
CN111010405A (en) * 2019-12-30 2020-04-14 上海电子信息职业技术学院 SaaS-based website security monitoring system
CN111291382A (en) * 2020-01-22 2020-06-16 上海电子信息职业技术学院 Vulnerability scanning system
US20210281609A1 (en) * 2015-10-28 2021-09-09 Qomplx, Inc. Rating organization cybersecurity using probe-based network reconnaissance techniques

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210281609A1 (en) * 2015-10-28 2021-09-09 Qomplx, Inc. Rating organization cybersecurity using probe-based network reconnaissance techniques
CN109948343A (en) * 2019-03-13 2019-06-28 杭州数梦工场科技有限公司 Leak detection method, Hole Detection device and computer readable storage medium
CN111010405A (en) * 2019-12-30 2020-04-14 上海电子信息职业技术学院 SaaS-based website security monitoring system
CN111291382A (en) * 2020-01-22 2020-06-16 上海电子信息职业技术学院 Vulnerability scanning system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BAIDU经验: "AWVS的使用方法介绍", pages 1 - 4, Retrieved from the Internet <URL:https://jingyan.baidu.com/article/c843ea0bd493da77931e4ae0.html> *

Similar Documents

Publication Publication Date Title
CN106790186B (en) Multi-step attack detection method based on multi-source abnormal event correlation analysis
US9264441B2 (en) System and method for securing a network from zero-day vulnerability exploits
CN110221977B (en) Ai-based website penetration test method
CN108830084B (en) Handheld terminal for realizing vulnerability scanning and protection reinforcement and protection method
CN105376245A (en) Rule-based detection method of ATP attack behavior
CN103532793A (en) Automatic penetration testing method for information system security
CN109344624B (en) Penetration testing method, platform, equipment and storage medium based on cloud cooperation
CN113067812B (en) APT attack event tracing analysis method and device and computer readable medium
Hatada et al. Empowering anti-malware research in Japan by sharing the MWS datasets
CN109409093B (en) System vulnerability scanning scheduling method
EP3855698A1 (en) Reachability graph-based safe remediations for security of on-premise and cloud computing environments
Mireles et al. Extracting attack narratives from traffic datasets
CN111884989A (en) Vulnerability detection method and system for power web system
CN111224991B (en) Network security emergency response method and response system
CN114915475A (en) Method, device, equipment and storage medium for determining attack path
Alghamdi Effective penetration testing report writing
Yermalovich et al. Formalization of attack prediction problem
WO2021243555A1 (en) Quick application test method and apparatus, device, and storage medium
CN113949536A (en) Semi-automatic infiltration method based on open source project
Marandi et al. Implementing and Automating Security Scanning to a DevSecOps CI/CD Pipeline
Aarya et al. Web scanning: existing techniques and future
CN111385253B (en) Vulnerability detection system for network security of power distribution automation system
KR20200059540A (en) System and method for malware detection
CN109743333A (en) A kind of system of comprehensive analysis enterprise network security loophole
US20230140706A1 (en) Pipelined Malware Infrastructure Identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination