CN117240622B - Method and device for collecting attack simulation samples in batches based on HTTP protocol - Google Patents

Method and device for collecting attack simulation samples in batches based on HTTP protocol Download PDF

Info

Publication number
CN117240622B
CN117240622B CN202311506157.7A CN202311506157A CN117240622B CN 117240622 B CN117240622 B CN 117240622B CN 202311506157 A CN202311506157 A CN 202311506157A CN 117240622 B CN117240622 B CN 117240622B
Authority
CN
China
Prior art keywords
attack
simulated
vulnerability
loopholes
loophole
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311506157.7A
Other languages
Chinese (zh)
Other versions
CN117240622A (en
Inventor
安祖贤
朱文雷
王刚
杨坤
张瀚
张博轩
薛运成
尤震
支玉栋
梁慧杰
王陶然
张嘉欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Chaitin Tech Co ltd
Original Assignee
Beijing Chaitin Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Chaitin Tech Co ltd filed Critical Beijing Chaitin Tech Co ltd
Priority to CN202311506157.7A priority Critical patent/CN117240622B/en
Publication of CN117240622A publication Critical patent/CN117240622A/en
Application granted granted Critical
Publication of CN117240622B publication Critical patent/CN117240622B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The application provides a method and a device for collecting attack simulation samples in batches based on an HTTP protocol, wherein loopholes and query expressions are obtained from a loophole library, and the loopholes obtained from the loophole library are subjected to duplication removal processing according to the loopholes stored in a security verification platform, so that the loopholes after duplication removal are obtained; determining an attack environment to be simulated according to the query expression; starting an HTTP proxy server; simulating an attack behavior of the environment to be simulated attack through the loopholes after the duplication removal; and recording HTTP request and response packets of the simulated attack row of the vulnerability environment to be simulated attack through the HTTP proxy server, and storing the HTTP request and response packets in the security verification platform. The method and the device can utilize the vulnerability simulation attacker to attack and serve as a security verification platform test case; the security verification platform reduces the risk of introducing new attacks to the user, and reduces the collection difficulty of the security verification platform test cases.

Description

Method and device for collecting attack simulation samples in batches based on HTTP protocol
Technical Field
The embodiments of the application belong to the technical field of network security, and particularly relate to a method and a device for collecting attack simulation samples in batches based on an HTTP protocol.
Background
Most of the security verification platforms in the current industry test the security defenses of an enterprise network by constructing a vulnerability shooting range in the actual environment of the enterprise and simulating attacks. The method has the following two defects:
constructing a vulnerability shooting range can generate new exposed surfaces, and can bring unexpected attacks to enterprises; because the number of the loopholes is large, the commercial product environment is not easy to build, and the difficulty of collecting the loophole shooting range environment in the actual process is greatly increased.
Disclosure of Invention
In order to solve or alleviate the problems in the prior art, the method and the device for testing the HTTP traffic by utilizing the vulnerability simulation attacker to attack by writing the program acquire the HTTP traffic as the test case of the security verification platform, so that the problems that a new attack surface can be generated and the test case is not easy to collect when a vulnerability shooting range is built in the prior art are solved.
In a first aspect, the present invention provides a method for batch collecting attack simulation samples based on HTTP protocol, where the method includes:
obtaining loopholes and query expressions from a loophole library, and performing duplication removal processing on the loopholes obtained from the loophole library according to the loopholes stored in the security verification platform to obtain duplicated loopholes;
determining an attack environment to be simulated according to the query expression;
starting an HTTP proxy server;
simulating an attack behavior of the environment to be simulated attack through the loopholes after the duplication removal;
and recording HTTP request and response packets of the simulated attack row of the vulnerability environment to be simulated attack through the HTTP proxy server, and storing the HTTP request and response packets in the security verification platform.
As a preferred embodiment of the present application, the performing, according to the loopholes stored in the security verification platform, a deduplication process on loopholes obtained from the loophole library includes:
determining the number of each vulnerability obtained from the vulnerability database, wherein the number comprises a cve number, a cnvd number and a custom number;
determining whether a vulnerability which is the same as the attribute of the vulnerability obtained from the vulnerability database exists in the security verification platform according to the number of the vulnerability;
if yes, updating the loopholes obtained from the loophole database into the security verification platform is not needed; and if not, updating the loopholes obtained from the loophole database into the security verification platform.
As a preferred embodiment of the application, the determining the attack environment to be simulated according to the query expression includes:
acquiring a preliminary attack environment to be simulated through the FOFA search engine;
and querying in the preliminary environment to be simulated through the query expression to determine the environment to be simulated attack.
As a preferred embodiment of the present application, before performing the deduplication processing on the obtained vulnerability according to the vulnerability stored in the security verification platform, the method includes:
loading the stored loopholes in the security verification platform and the loopholes obtained from the loophole library into a memory to perform duplication removal processing on the obtained loopholes;
and constructing a first storage structure in the memory according to different attributes of the stored loopholes in the security verification platform.
In a preferred embodiment of the present application, after obtaining the duplicate vulnerability information, the method includes:
loading a classification dictionary in the security verification platform into a memory;
and mapping the vulnerability identifications obtained from the vulnerability library into vulnerability identifications in the security verification platform according to the classification dictionary, and constructing a second storage structure in a memory according to the mapping relation between the vulnerability identifications in the security verification platform and the vulnerability identifications obtained from the vulnerability library.
As a preferred embodiment of the present application, after the HTTP proxy server is started, the method includes:
and loading the description file and the attribute of the utilization mode of the loophole after the duplication removal into a memory, wherein the attribute comprises a loophole title, the influence generated by the loophole, a loophole repair suggestion and a loophole reference link.
As a preferred embodiment of the present application, the simulating, by the HTTP proxy server, the attack behavior of the vulnerability to be simulated attack environment information through the deduplicated vulnerability includes:
acquiring a description file and an attribute of the utilization mode of the loophole after duplication removal from the memory;
determining the type of the loophole after duplication removal according to the description file and the attribute of the loophole after duplication removal;
if the type of the loophole after the duplication removal is the FOFA type, calling a to-be-simulated attack environment containing the loophole after the duplication removal through a FOFA search engine interface;
traversing the to-be-simulated attack environment list to determine whether the to-be-simulated attack environment is online, and if so, attacking the online to-be-simulated attack environment through the loopholes after duplication removal;
judging whether the attack is successful, if so, recording HTTP request and response packet of the simulated attack row of the environment to be simulated attack by the loophole after the duplication removal through the HTTP proxy server, and storing the HTTP request and response packet in a security verification platform.
In a preferred embodiment of the present application, the determining the type of the loophole after duplication removal according to the description file and the attribute of the loophole after duplication removal includes:
judging whether the FOFA field of the loophole after the duplication removal contains "=", and if so, determining that the loophole after the duplication removal is of the FOFA type.
As a preferred embodiment of the present application, after recording, by the HTTP proxy server, an HTTP request and a response packet for simulating an attack behavior of the vulnerability after the duplication removal to the environment to be simulated, the method includes:
judging whether the attack environment to be simulated is a sensitive attack environment to be simulated or not;
if yes, the identification of the sensitive attack environment to be simulated is replaced by the characteristic character string.
Compared with the prior art, the embodiment of the application obtains the loopholes and the query expression from the loophole library, and performs duplication removal processing on the loopholes obtained from the loophole library according to the loopholes stored in the security verification platform to obtain duplicated loopholes; determining an attack environment to be simulated according to the query expression; starting an HTTP proxy server; simulating an attack behavior of the environment to be simulated attack through the loopholes after the duplication removal; and recording HTTP request and response packets of the simulated attack row of the vulnerability environment to be simulated attack through the HTTP proxy server, and storing the HTTP request and response packets in the security verification platform. The method and the device can utilize the vulnerability simulation attacker to attack and serve as a security verification platform test case; the security verification platform reduces the risk of introducing new attacks to the user, and reduces the collection difficulty of the security verification platform test cases.
In a second aspect, an embodiment of the present application further provides an apparatus for batch collecting attack simulation samples based on HTTP protocol, including:
the deduplication module is used for acquiring loopholes and query expressions from a loophole library, performing deduplication processing on the loopholes acquired from the loophole library according to the loopholes stored in the security verification platform, and acquiring the loopholes subjected to deduplication;
the determining module is used for determining an attack environment to be simulated according to the query expression;
the starting module is used for starting the HTTP proxy server;
the attack module is used for simulating attack behaviors of the environment to be simulated attack through the loopholes after the duplication removal;
and the recording module is used for recording HTTP request and response packets of the simulated attack row of the environment to be simulated attack by the loophole after the duplication removal through the HTTP proxy server and storing the HTTP request and response packets in the security verification platform.
Compared with the prior art, the device for collecting attack simulation samples in batches based on the HTTP protocol has the same beneficial effects as the first aspect and is not described in detail herein.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. Some specific embodiments of the present application will be described in detail hereinafter by way of example and not by way of limitation with reference to the accompanying drawings. The same reference numbers in the drawings denote the same or similar parts or portions, and it will be understood by those skilled in the art that the drawings are not necessarily drawn to scale, in which:
fig. 1 is a schematic flow chart of a method for batch collection of attack simulation samples based on HTTP protocol according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an apparatus for batch collection of attack simulation samples based on HTTP protocol according to an embodiment of the present application.
Detailed Description
In order to enable those skilled in the art to better understand the present application, the following description will make clear and complete descriptions of the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application. It will be apparent that the described embodiments are merely some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
In a first aspect, as shown in fig. 1, the present invention provides a method for collecting attack simulation samples in batches based on HTTP protocol, where the method includes:
step S01, obtaining loopholes and query expressions from a loophole library, and performing duplication removal processing on the loopholes obtained from the loophole library according to the loopholes stored in a security verification platform to obtain duplicated loopholes;
it should be noted that, the vulnerability database includes vulnerability databases composed of a national information security vulnerability database, a general vulnerability disclosure vulnerability database and a custom vulnerability database, and is mainly used for constructing a national information security vulnerability data management platform for operation and maintenance.
And the vulnerability library stores query expressions which mainly determine the attack environment to be simulated.
Firstly, the loopholes are required to be called from the loophole library so as to store the loopholes which are not in the security verification platform, and in order to avoid that the loopholes obtained from the loophole library cannot be repeated with the loopholes in the security verification platform, the loophole library is required to be subjected to duplication removal processing.
As a preferred embodiment of the present application, before performing the deduplication processing on the obtained vulnerability according to the vulnerability stored in the security verification platform, the method includes:
loading the stored loopholes in the security verification platform and the loopholes obtained from the loophole library into a memory to perform duplication removal processing on the obtained loopholes;
and constructing a first storage structure in the memory according to different attributes of the stored loopholes in the security verification platform.
In order to improve the duplication removal efficiency, the obtained loopholes are duplicated and then in the memory, so that the loopholes stored in the security verification platform and the loopholes obtained from the loophole library need to be loaded into the memory. After the vulnerability is deduplicated, the deduplicated vulnerability needs to be stored in a security verification platform. Specifically, the loopholes stored in the security verification platform are loaded into the memory, and a cveMap (map [ cve _id ] pool), a cnvdMap (map [ cnvd_id ] pool), and a ctMap (map [ chatin_number ] pool) structure is constructed.
Specifically, performing deduplication processing on vulnerabilities obtained from the vulnerability database includes:
determining the number of each vulnerability obtained from the vulnerability database, wherein the number comprises a cve number, a cnvd number and a custom number;
determining whether a vulnerability which is the same as the attribute of the vulnerability obtained from the vulnerability database exists in the security verification platform according to the number of the vulnerability;
if yes, updating the loopholes obtained from the loophole database into the security verification platform is not needed; and if not, updating the loopholes obtained from the loophole database into the security verification platform.
It should be noted that, the cnvd number is a vulnerability from a national information security vulnerability database, the cve number is a vulnerability from a general vulnerability disclosure vulnerability database, and the vulnerabilities in the custom vulnerability database are vulnerabilities not available in the national information security vulnerability database and the general vulnerability disclosure vulnerability database.
In a preferred embodiment of the present application, after obtaining the duplicate vulnerability information, the method includes:
loading a classification dictionary in the security verification platform into a memory;
and mapping the vulnerability identifications obtained from the vulnerability library into vulnerability identifications in the security verification platform according to the classification dictionary, and constructing a second storage structure in a memory according to the mapping relation between the vulnerability identifications in the security verification platform and the vulnerability identifications obtained from the vulnerability library.
It should be noted that, the security verification platform is provided with a classification dictionary, the classification dictionary is used for uniformly identifying the loopholes obtained from the loophole library and the loopholes in the security verification platform, and meanwhile, a mapping relationship is established between the loopholes obtained from the loophole library and the loopholes in the security verification platform in a memory, and specifically, the second storage structure is a healthy value storage structure.
Step S02, determining an attack environment to be simulated according to the query expression;
step S02 specifically includes:
acquiring a preliminary attack environment to be simulated through the FOFA search engine;
and querying in the preliminary environment to be simulated through the query expression to determine the environment to be simulated attack.
It should be noted that, the FOFA is a professional web space search engine, which can search for target information in a specific area through various keywords, grammar, and the like. Unlike conventional search engines, FOFA is more focused on the collection and analysis of information for various entities in the network space.
The vulnerability to be attacked is determined in step S01, and is a vulnerability after duplication removal, and the vulnerability after duplication removal is stored in the security verification platform. The to-be-simulated attack environment of the to-be-attacked vulnerability is determined, that is, the to-be-simulated attack environment in the vulnerability simulation process has special requirements, and specifically, the preliminary to-be-simulated attack environment is obtained through the FOFA search engine; and then inquiring in the preliminary environment to be simulated through the inquiry expression to determine the environment to be simulated and attacked, wherein the inquiry expression is stored in a vulnerability library.
Step S03, starting an HTTP proxy server;
it should be noted that, an HTTP proxy server needs to be started to collect HTTP request and response packets of an environment to be emulated by a vulnerability emulation attack.
After the HTTP proxy server is started, the method comprises the following steps:
and loading the description file and the attribute of the utilization mode of the loophole after the duplication removal into a memory, wherein the attribute comprises a loophole title, the influence generated by the loophole, a loophole repair suggestion and a loophole reference link.
It should be noted that, specifically, a poc_1.Json compression packet derived from the vulnerability library is loaded, where the poc_1.Json compression packet includes a vulnerability list and an utilization mode of each vulnerability, and a pocMap (map binding_id) poc structure is constructed in the memory;
all json files in a vulnerabilities folder derived from the vulnerability library are loaded, the vulnerabilities folder comprises properties of the vulnerability, the properties comprise vulnerability titles, vulnerability generating effects, vulnerability repair suggestions and vulnerability reference links, and a vulnerap (map [ binding_id ] vul) structure is constructed in a memory.
Step S04, simulating attack behaviors of the environment to be simulated attack through the loopholes after duplication removal;
step S04, specifically includes:
acquiring a description file and an attribute of the utilization mode of the loophole after duplication removal from the memory;
determining the type of the loophole after duplication removal according to the description file and the attribute of the loophole after duplication removal;
if the type of the loophole after the duplication removal is the FOFA type, calling a to-be-simulated attack environment containing the loophole after the duplication removal through a FOFA search engine interface;
traversing the to-be-simulated attack environment list to determine whether the to-be-simulated attack environment is online, and if so, attacking the online to-be-simulated attack environment through the loopholes after duplication removal; judging whether the attack environment to be simulated is on line or not by the following method: and (3) trying to perform tcp connection test with the attack environment to be simulated, setting the timeout time to be 5 seconds, judging that the attack environment to be simulated is online if a response exists in 5 seconds, and judging that the attack environment to be simulated is not online if no response exists in more than 5 seconds.
Judging whether the attack is successful, if so, recording HTTP request and response packet of the simulated attack row of the environment to be simulated attack by the loophole after the duplication removal through the HTTP proxy server, and storing the HTTP request and response packet in a security verification platform.
It should be noted that, step S04 mainly describes how to simulate the attack process by the vulnerability. Specifically, traversing the poc_code folder, the poc_code folder is obtained from decompression of the poc_1.Json compression packet.
Traversing the poc_code folder specifically includes the following:
extracting a binding_id according to the name of the poc_code folder;
acquiring the attribute vulnerabilities corresponding to the poc_codes and the description file poc information of the vulnerability exploitation modes from the vulMap and the pocMap according to the binding_id;
then the verification type of the poc needs to be judged;
firstly, judging whether the vulnerability is of the FOFA type, if not, judging whether the vulnerability is of the FOFA type: skipping, and processing the next poc_code folder;
if the vulnerability is of the FOFA type: judging whether the FOFA field contains "=", if not, skipping the loophole, and processing the next loophole; if it comprises: calling an api interface of the FOFA search engine to obtain an attack environment to be simulated containing the vulnerability;
then traversing the to-be-simulated attack environment returned by the FOFA search engine, wherein the attack behavior through the loopholes mainly aims at the on-line to-be-simulated attack environment, so that whether the environment is on-line or not needs to be detected, if the to-be-simulated attack environment is off-line through detection, skipping the to-be-simulated attack environment, and processing the next to-be-simulated attack environment; if online, the vulnerability simulation hacker attacks the attack environment to be simulated;
after the attack is carried out on the online environment to be simulated by the loophole simulation hacker, if the attack is unsuccessful, the next online environment to be simulated is carried out to continuously try the attack;
if the attack is successful, the HTTP request and response packet is recorded by the HTTP proxy server and stored in the security verification platform so as to be multiplexed. In a specific application scenario, only HTTP request and response packets are obtained as security verification platform test cases so as to test network security defenses.
After recording the HTTP request and response packet of the attack behavior simulated by the loophole after the duplication removal to the environment to be simulated attack by the HTTP proxy server, the method comprises the following steps:
judging whether the attack environment to be simulated is a sensitive attack environment to be simulated or not;
if yes, the identification of the sensitive attack environment to be simulated is replaced by the characteristic character string.
It should be noted that when the attack environment to be simulated is attacked by the loophole after the duplication, the attack environment to be simulated may be some sensitive environments, so the identification of the sensitive attack environment to be simulated needs to be replaced by the characteristic character string.
And step S05, recording HTTP request and response packets of the simulated attack row of the environment to be simulated attack by the loophole after the duplication removal through the HTTP proxy server, and storing the HTTP request and response packets in the security verification platform.
According to the embodiment of the application, the flow based on HTTP protocol batch acquisition attack simulation is mainly used as a security verification platform test case so as to test the network security defense capability, and the situation that a vulnerability range needs to be built in an actual environment to simulate attacks to test the network security defense capability is not needed like in the prior art, so that the situation that new exposed surfaces are possibly generated when the vulnerability range is built can be avoided, and unexpected attacks are brought. Meanwhile, the problems that the commercial product environment is not easy to build and the difficulty of collecting the environment of the vulnerability shooting range in the actual process is increased due to the large number of vulnerabilities are avoided.
In a second aspect, as shown in fig. 2, an embodiment of the present application further provides an apparatus for batch collecting attack simulation samples based on HTTP protocol, including:
the deduplication module 21 is configured to obtain a vulnerability and a query expression from a vulnerability database, and perform deduplication processing on the vulnerability obtained from the vulnerability database according to the vulnerability stored in the security verification platform, so as to obtain a deduplicated vulnerability;
a determining module 22, configured to determine an attack environment to be simulated according to the query expression;
a starting module 23, configured to start the HTTP proxy server;
the attack module 24 is configured to simulate an attack behavior of the attack environment to be simulated through the loophole after duplication removal;
and the recording module 25 records HTTP request and response packets of the simulated attack row of the environment to be simulated attack through the loophole after the duplication removal by the HTTP proxy server and stores the HTTP request and response packets in the security verification platform.
Compared with the prior art, the device for collecting attack simulation samples in batches based on the HTTP protocol has the same beneficial effects as the first aspect and is not described in detail herein.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A method for batch acquisition of attack simulation samples based on HTTP protocol, comprising:
obtaining loopholes and query expressions from a loophole library, and performing duplication removal processing on the loopholes obtained from the loophole library according to the loopholes stored in the security verification platform to obtain duplicated loopholes;
determining an attack environment to be simulated according to the query expression;
starting an HTTP proxy server;
simulating an attack behavior of the environment to be simulated attack through the loopholes after the duplication removal;
and recording HTTP request and response packets of the simulated attack row of the vulnerability environment to be simulated attack through the HTTP proxy server, and storing the HTTP request and response packets in the security verification platform.
2. The method of claim 1, wherein the performing deduplication processing on vulnerabilities obtained from the vulnerability library according to vulnerabilities stored in a security verification platform comprises:
determining the number of each vulnerability obtained from the vulnerability database, wherein the number comprises a cve number, a cnvd number and a custom number;
determining whether a vulnerability which is the same as the attribute of the vulnerability obtained from the vulnerability database exists in the security verification platform according to the number of the vulnerability;
if yes, updating the loopholes obtained from the loophole database into the security verification platform is not needed; and if not, updating the loopholes obtained from the loophole database into the security verification platform.
3. The method for batch collection of attack simulation samples based on HTTP protocol according to claim 1, wherein the determining the attack environment to be simulated according to the query expression comprises:
acquiring a preliminary attack environment to be simulated through the FOFA search engine;
and querying in the preliminary environment to be simulated through the query expression to determine the environment to be simulated attack.
4. The method for batch collection of attack simulation samples based on HTTP protocol as set forth in claim 1, wherein before performing the deduplication processing on the obtained vulnerabilities according to the vulnerabilities stored in the security verification platform, the method comprises:
loading the stored loopholes in the security verification platform and the loopholes obtained from the loophole library into a memory to perform duplication removal processing on the obtained loopholes;
and constructing a first storage structure in the memory according to different attributes of the stored loopholes in the security verification platform.
5. The method for batch collection of attack simulation samples based on HTTP protocol as set forth in claim 1, wherein after obtaining the deduplicated vulnerability information, the method comprises:
loading a classification dictionary in the security verification platform into a memory;
and mapping the vulnerability identifications obtained from the vulnerability library into vulnerability identifications in the security verification platform according to the classification dictionary, and constructing a second storage structure in a memory according to the mapping relation between the vulnerability identifications in the security verification platform and the vulnerability identifications obtained from the vulnerability library.
6. The method for batch collection of attack simulation samples based on HTTP protocol as set forth in claim 1, wherein after the HTTP proxy server is started, the method comprises:
and loading the description file and the attribute of the utilization mode of the loophole after the duplication removal into a memory, wherein the attribute comprises a loophole title, the influence generated by the loophole, a loophole repair suggestion and a loophole reference link.
7. The method for batch collection of attack simulation samples based on HTTP protocol as set forth in claim 6, wherein the simulating the attack behavior of the attack environment information to be simulated by the HTTP proxy server through the loopholes after the duplication removal comprises:
acquiring a description file and an attribute of the utilization mode of the loophole after duplication removal from the memory;
determining the type of the loophole after duplication removal according to the description file and the attribute of the loophole after duplication removal;
if the type of the loophole after the duplication removal is the FOFA type, calling a to-be-simulated attack environment containing the loophole after the duplication removal through a FOFA search engine interface;
traversing the to-be-simulated attack environment list to determine whether the to-be-simulated attack environment is online, and if so, attacking the online to-be-simulated attack environment through the loopholes after duplication removal;
judging whether the attack is successful, if so, recording HTTP request and response packet of the simulated attack row of the environment to be simulated attack by the loophole after the duplication removal through the HTTP proxy server, and storing the HTTP request and response packet in a security verification platform.
8. The method of claim 7, wherein the determining the type of the vulnerability after deduplication according to the description file and the attribute of the utilization mode of the vulnerability after deduplication comprises:
judging whether the FOFA field of the loophole after the duplication removal contains "=", and if so, determining that the loophole after the duplication removal is of the FOFA type.
9. The method of claim 1, wherein after recording, by the HTTP proxy server, HTTP request and response packets for the vulnerability after the deduplication to simulate an attack by the environment to be attacked, the method comprises:
judging whether the attack environment to be simulated is a sensitive attack environment to be simulated or not;
if yes, the identification of the sensitive attack environment to be simulated is replaced by the characteristic character string.
10. An apparatus for batch collection of attack simulation samples based on HTTP protocol, comprising:
the deduplication module is used for acquiring loopholes and query expressions from a loophole library, performing deduplication processing on the loopholes acquired from the loophole library according to the loopholes stored in the security verification platform, and acquiring the loopholes subjected to deduplication;
the determining module is used for determining an attack environment to be simulated according to the query expression;
the starting module is used for starting the HTTP proxy server;
the attack module is used for simulating attack behaviors of the environment to be simulated attack through the loopholes after the duplication removal;
and the recording module is used for recording HTTP request and response packets of the simulated attack row of the environment to be simulated attack by the loophole after the duplication removal through the HTTP proxy server and storing the HTTP request and response packets in the security verification platform.
CN202311506157.7A 2023-11-13 2023-11-13 Method and device for collecting attack simulation samples in batches based on HTTP protocol Active CN117240622B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311506157.7A CN117240622B (en) 2023-11-13 2023-11-13 Method and device for collecting attack simulation samples in batches based on HTTP protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311506157.7A CN117240622B (en) 2023-11-13 2023-11-13 Method and device for collecting attack simulation samples in batches based on HTTP protocol

Publications (2)

Publication Number Publication Date
CN117240622A CN117240622A (en) 2023-12-15
CN117240622B true CN117240622B (en) 2024-01-23

Family

ID=89088408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311506157.7A Active CN117240622B (en) 2023-11-13 2023-11-13 Method and device for collecting attack simulation samples in batches based on HTTP protocol

Country Status (1)

Country Link
CN (1) CN117240622B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080065084A (en) * 2007-01-08 2008-07-11 유디코스모 주식회사 Method and apparatus for analyzing network vulnerability using the attack simulation
CN112615836A (en) * 2020-12-11 2021-04-06 杭州安恒信息技术股份有限公司 Industrial control network safety protection simulation system
CN114969760A (en) * 2022-06-16 2022-08-30 成都欧珀通信科技有限公司 Vulnerability detection method and device, computer readable medium and electronic equipment
CN115801464A (en) * 2023-02-06 2023-03-14 北京长亭未来科技有限公司 Analog simulation method, system, equipment and storage medium based on TCP protocol attack

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8650637B2 (en) * 2011-08-24 2014-02-11 Hewlett-Packard Development Company, L.P. Network security risk assessment
US10841327B2 (en) * 2012-09-19 2020-11-17 International Business Machines Corporation Mining attack vectors for black-box security testing
US9977904B2 (en) * 2014-02-25 2018-05-22 Board Of Regents, The University Of Texas System Systems and methods for automated detection of application vulnerabilities

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080065084A (en) * 2007-01-08 2008-07-11 유디코스모 주식회사 Method and apparatus for analyzing network vulnerability using the attack simulation
CN112615836A (en) * 2020-12-11 2021-04-06 杭州安恒信息技术股份有限公司 Industrial control network safety protection simulation system
CN114969760A (en) * 2022-06-16 2022-08-30 成都欧珀通信科技有限公司 Vulnerability detection method and device, computer readable medium and electronic equipment
CN115801464A (en) * 2023-02-06 2023-03-14 北京长亭未来科技有限公司 Analog simulation method, system, equipment and storage medium based on TCP protocol attack

Also Published As

Publication number Publication date
CN117240622A (en) 2023-12-15

Similar Documents

Publication Publication Date Title
CN109375945B (en) Firmware version detection method and vulnerability repair rate evaluation method for Internet of things equipment
Tang et al. A large-scale empirical study on industrial fake apps
CN111221625B (en) File detection method, device and equipment
CN111368289B (en) Malicious software detection method and device
CN108256329B (en) Fine-grained RAT program detection method and system based on dynamic behavior and corresponding APT attack detection method
CN110768875A (en) Application identification method and system based on DNS learning
CN113239365B (en) Vulnerability repairing method based on knowledge graph
CN111723371A (en) Method for constructing detection model of malicious file and method for detecting malicious file
CN112328499A (en) Test data generation method, device, equipment and medium
CN114650176A (en) Phishing website detection method and device, computer equipment and storage medium
TW202240453A (en) Method and computer for learning corredpondence between malicious behaviors and execution trace of malware and method for implementing neural network
CN117240622B (en) Method and device for collecting attack simulation samples in batches based on HTTP protocol
CN115766258B (en) Multi-stage attack trend prediction method, equipment and storage medium based on causal relationship graph
CN114817928A (en) Network space data fusion analysis method and system, electronic device and storage medium
CN112751863B (en) Attack behavior analysis method and device
CN113596061B (en) Network security vulnerability response method based on block chain technology
CN113031995B (en) Rule updating method and device, storage medium and electronic equipment
CN115001724B (en) Network threat intelligence management method, device, computing equipment and computer readable storage medium
KR102495329B1 (en) Malware detection system using lstm method to provide a service vaccine platform with high detction rate
CN117609175B (en) Configurable industrial control file acquisition and analysis method and system
CN116502009B (en) Webpage filtering method, device, equipment and storage medium
CN112580037B (en) Method, device and equipment for repairing virus file data
KR102655234B1 (en) Method and apparatus for retrieving packet at high-speed
CN117082524A (en) Wireless communication safety protection method, device and system
CN117972688A (en) Malicious application detection method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant