CN106096417B - A kind of Weblogic unserializings vulnerability scanning detection method and tool - Google Patents
A kind of Weblogic unserializings vulnerability scanning detection method and tool Download PDFInfo
- Publication number
- CN106096417B CN106096417B CN201610382393.6A CN201610382393A CN106096417B CN 106096417 B CN106096417 B CN 106096417B CN 201610382393 A CN201610382393 A CN 201610382393A CN 106096417 B CN106096417 B CN 106096417B
- Authority
- CN
- China
- Prior art keywords
- vulnerability
- module
- vulnerability scanning
- weblogic
- document
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 45
- 238000012795 verification Methods 0.000 claims abstract description 13
- 238000000034 method Methods 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 10
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 238000012790 confirmation Methods 0.000 claims description 5
- 238000007599 discharging Methods 0.000 claims description 3
- 238000010200 validation analysis Methods 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 7
- 230000008901 benefit Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000002592 echocardiography Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of Weblogic unserializings vulnerability scanning detection methods, obtain document to be detected first;Start weblogic unserializing vulnerability scanning detection instruments;Then vulnerability scanning is carried out to document to be detected;Finally judge that document to be detected whether there is loophole, if it is, the vulnerability information of output host;If it is not, then return to step is continued to scan on until the end of scan.Weblogic unserializings vulnerability scanning detection method provided by the invention carries out vulnerability scanning, verification based on Java unserializings loophole to deployment Weblogic servers;Real-time search can be reached, stablized, it is reliably, quickly, easy to install and use.Can scanning validation be deployed with the server of weblogic and whether there is Java unserializing loopholes, and it is utilized, is simple and efficient, reduce manual intervention, realize automatic diagnostic function, support is provided safely for system.
Description
Technical field
The present invention relates to information security and webpage framework field, especially a kind of Weblogic unserializings vulnerability scanning inspection
Survey method.
Background technology
WebLogic is a middleware based on JAVAEE frameworks, and WebLogic is for developing, integrating, dispose and manage
Manage the Java application servers of large-scale distributed Web applications, network application and database application.By the dynamic function of Java and
Among what the safety introducing catenet of Java Enterprise standards was applied develops, integrates, disposes and manages.
Weblogic is widely used and the industry-by-industries such as telecommunications, finance, electric power, aviation, government.
Java serializings are exactly that object is converted into byte stream, convenient for being stored in memory, file, database;Antitone sequence
It is inverse process to change, and object is reduced by byte stream.If Java apply to user input, i.e., can not letter data done unserializing
Processing allows unserializing to generate unexpected object, unexpected object exists then attacker can input by constructing malice
During generating it is possible to that arbitrary code is brought to execute.The tool is realized using this loophole.Same such middleware
Maintenance also faces increasing challenge, and the core of client, crucial system are all deployed in Weblogic platforms, once occur tight
Emergency occurs for weight loophole, causes to be vulnerable to attack, if cannot be resolved in time, consequence will be hardly imaginable.Network
Upper same type tool, by taking WebLogic_EXP as an example, which can only carry out a target validating vulnerability, order executes
Etc. functions.
Therefore, it is necessary to a kind of Weblogic unserializings vulnerability scanning detection methods.
Invention content
It is an object of the invention to provide a kind of Weblogic unserializings vulnerability scanning detection methods.
It is realized the purpose of the present invention is technical solution in this way:
A kind of Weblogic unserializings vulnerability scanning detection method provided by the invention, includes the following steps:
S1:Obtain document to be detected;
S2:Start Weblogic unserializing vulnerability scanning detection instruments;
S3:Vulnerability scanning is carried out to document to be detected;
S4:Judge that document to be detected whether there is loophole, if it is, the vulnerability information of output host;
S5:If it is not, then return to step is continued to scan on until the end of scan;
The vulnerability scanning is as follows:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then current active subscriber is checked in long-range execution order;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then current active subscriber is checked in long-range execution order;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then return to step S326;
S328:If it is, terminating.
Further, further comprising the steps of:
S61:Validating vulnerability is carried out to document to be detected;
S62:Judge document to be detected whether successful connection, if it is not, then terminate;
S63:It orders if it succeeds, executing and shows result;
S64:Judge whether to terminate verification process, if it is not, then return to step continues to verify;
S65:If it is, disconnecting and discharging resource and terminate validating vulnerability.
The present invention also provides a kind of Weblogic unserializings vulnerability scanning detection instruments, including input module, loophole
Scan module, Hole Detection module, loophole judgment module and loophole output module;
The input module, for obtaining document to be detected;
The vulnerability scanning module, for starting Weblogic unserializing vulnerability scanning detection instruments;
The Hole Detection module, for carrying out vulnerability scanning to document to be detected;
The loophole judgment module for judging that document to be detected whether there is loophole, and exports the vulnerability information of host;
The loophole output module, for exporting vulnerability scanning information.
The input module of the present embodiment starts vulnerability scanning module by the scan button event response of setting;The loophole
Scan module is connect with Hole Detection module;The Hole Detection module is connect with loophole judgment module;Loophole judgment module
Structure is input to the output display of loophole output module;
Further include validating vulnerability module, connecting detection module and verification confirmation module;
The validating vulnerability module, for carrying out validating vulnerability to document to be detected;And export verification process result information;
The connecting detection module, for judge document to be detected whether successful connection, and show connection result;
The verification confirmation module, for disconnecting release resource and terminating validating vulnerability.
Button event response setting and startup interface are connected, validating vulnerability module is confirmed by connecting detection module and verification
Module connects.Vulnerability scanning and validating vulnerability module enter the destination server of connection after passing through, subsequently into registration service
Journey, and system command is executed, finally disconnect;
The vulnerability scanning module realizes Hole Detection process according to the following steps:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then current active subscriber is checked in long-range execution order;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then current active subscriber is checked in long-range execution order;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then return to step S326;
S328:If it is, terminating.
By adopting the above-described technical solution, the present invention has the advantage that:
Weblogic unserializings vulnerability scanning detection method provided by the invention, based on Java unserializing loopholes to portion
It affixes one's name to Weblogic servers and carries out vulnerability scanning, verification;The tool is developed using Java, can be in installations such as Windows and Linux
Have and run in the system of Java Runtime Environment, real-time search can be reached, stablizes, it is reliably, quickly, easy to install and use.It can be with
The server that scanning validation is deployed with Weblogic whether there is Java unserializing loopholes, and be utilized to it, simple high
Effect reduces manual intervention, realizes automatic diagnostic function, and support is provided safely for system.
Other advantages, target and the feature of the present invention will be illustrated in the following description to a certain extent, and
And to a certain extent, based on will be apparent to those skilled in the art to investigating hereafter, Huo Zheke
To be instructed from the practice of the present invention.The target and other advantages of the present invention can by following specification realizing and
It obtains.
Description of the drawings
The description of the drawings of the present invention is as follows.
Fig. 1 is the Weblogic unserializing vulnerability scanning detection method flow charts of the present invention.
Fig. 2 is that the vulnerability scanning of the present invention verifies detection function call flow schematic diagram.
Fig. 3 is the vulnerability scanning flow chart of the present invention.
Specific implementation mode
The invention will be further described with reference to the accompanying drawings and examples.
Embodiment 1
As shown in Figs. 1-3, a kind of Weblogic unserializings vulnerability scanning detection method provided in this embodiment, including with
Lower step:
S1:Obtain document to be detected;
S2:Start Weblogic unserializing vulnerability scanning detection instruments;
S3:Vulnerability scanning is carried out to document to be detected;
S4:Judge that document to be detected whether there is loophole, if it is, the vulnerability information of output host;
S5:If it is not, then return to step is continued to scan on until the end of scan.
It is further comprising the steps of:
S61:Validating vulnerability is carried out to document to be detected;
S62:Judge document to be detected whether successful connection, if it is not, then terminate;
S63:It orders if it succeeds, executing and shows result;
S64:Judge whether to terminate verification process, if it is not, then return to step continues to verify;
S65:If it is, disconnecting and discharging resource and terminate validating vulnerability.
The vulnerability scanning is as follows:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then long-range execute order whoami;
Current active subscriber is checked in the order whoami expressions of the present embodiment;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then long-range execute order whoami;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then;
S328:If it is, terminating.
The present embodiment additionally provides a kind of Weblogic unserializings vulnerability scanning detection instrument, comprises the following modules:
Input module, for obtaining document to be detected;
Vulnerability scanning module, for starting Weblogic unserializing vulnerability scanning detection instruments;
Hole Detection module, for carrying out vulnerability scanning to document to be detected;
Loophole judgment module for judging that document to be detected whether there is loophole, and exports the vulnerability information of host;
Loophole output module, for exporting vulnerability scanning information.
It is further comprising the steps of:
Validating vulnerability module, for carrying out validating vulnerability to document to be detected;And export verification process result information;
Connecting detection module, for judge document to be detected whether successful connection, and show connection result;
Confirmation module is verified, for disconnecting release resource and terminating validating vulnerability.
The vulnerability scanning module realizes Hole Detection process according to the following steps:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then long-range execute order whoami;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then long-range execute order whoami;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then return to step S326;
S328:If it is, terminating.
Embodiment 2
As shown in Fig. 2, Weblogic unserializings vulnerability scanning detection method provided in this embodiment, is used for vulnerability scanning
And validating vulnerability:Weblogic unserializing vulnerability scanning detection instrument programs principal function, entrance are called first;Then initial
Change Weblogic unserializing vulnerability scanning detection instrument main interfaces;Generate Weblogic unserializing vulnerability scanning detection instruments
Main interface button;Select vulnerability scanning module thread, or selection validating vulnerability module thread;Connection Service device and registration letter
Number;Execute command functions;Finally discharge contiguous function.The more host addresses of Weblogic unserializing vulnerability scannings detection support,
Multiport vulnerability scanning.Friendly interface requires personnel ability low, suitable arbitrary personnel's use, friendly interface, to personnel ability
It is required that it is low, it is suitble to arbitrary personnel to use, and custom command is supported to execute, scanning result and order is returned by echoing text box
Implementing result understands scan progress, scanning result and command execution results in time.
Vulnerability scanning is as follows:
(1) IP address is inputted
Input needs the address scanned or the network segment in " IP address " text box, is separated with ", " between address, such as:It can
It inputs " 192.168.1.2,192.168.1.1,192.168.2.0/24 ".
(2) input port range
The port scanned or port range defeated can be needed at " port range ", be connected with "-" between port range, port
Between separated with ", ", such as:It can input " 232,342,7000-7010 ".
(3) input scanning thread
Scanning number of threads can be set at " scanning thread ".
(4) scanning result echoes
Scanning result can be echoed, there are loopholes for those hosts, preserve result hereof after the completion of scanning.
This method carries out vulnerability scanning to host within the scope of given network address, supports multiaddress, multiport, presses address
The batch scannings such as section, port range.
Steps are as follows for validating vulnerability:
(1) IP address is inputted
Input needs to carry out the host IP address of validating vulnerability in " IP address " text box.
(2) input port
Input needs to carry out the host port of validating vulnerability in " port " text box.
(3) selection operation system
The OS Type of selection target host in " operating system " drop-down list.
(4) order executes
Input needs the order executed in " order " text box, and system command is executed by this tool.
(5) command result echoes:
Command execution results are echoed, judge whether order runs succeeded.
This method is executed to determining that host carries out validating vulnerability, utilization and order.
Embodiment 3
The present embodiment sweeps destination server by the tool that the detection of Weblogic unserializing vulnerability scannings generates
It is illustrated for retouching.
1, vulnerability scanning
(1) " run.bat " is double-clicked, starts independent research weblogic_unserialize_tool tools, select " loophole
Scanning " module;
(2) scan address range and port range are inputted, setting scans thread, such as:Address range is
" 192.168.56.101,192.168.56.102 ", port range are " 7000-7010 ", and thread is set as 5;
(3) it clicks " scanning " button to be scanned, tool can show scan progress, and show that there are the host of loophole letters
Breath;
2, validating vulnerability
(1) " validating vulnerability " module is selected, destination host information, and selection operation system are inputted, such as:Destination host IP
For " 192.168.56.102 ", port is " 7001 ", and operating system is " Windows ";
(2) it clicks a " connect " button and is attached, relevant information is shown after successful connection;
(3) " execution " button is clicked after input order, tool will execute related command, and show implementing result, execute
" whoami " and " ipconfig " is ordered.
(4) "off" button is clicked, tool will be switched off connecting and discharge resource.
Finally illustrate, the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although with reference to compared with
Good embodiment describes the invention in detail, it will be understood by those of ordinary skill in the art that, it can be to the skill of the present invention
Art scheme is modified or replaced equivalently, and without departing from the objective and range of the technical program, should all be covered in the present invention
Claimed range in.
Claims (3)
1. a kind of Weblogic unserializings vulnerability scanning detection method, it is characterised in that:Include the following steps:
S1:Obtain document to be detected;
S2:Start Weblogic unserializing vulnerability scanning detection instruments;
S3:Vulnerability scanning is carried out to document to be detected;
S4:Judge that document to be detected whether there is loophole, if it is, the vulnerability information of output host;
S5:If it is not, then return to step is continued to scan on until the end of scan;
The vulnerability scanning is as follows:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then current active subscriber is checked in long-range execution order;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then current active subscriber is checked in long-range execution order;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then return to step S326;
S328:If it is, terminating.
2. Weblogic unserializings vulnerability scanning detection method as described in claim 1, it is characterised in that:Further include following
Step:
S61:Validating vulnerability is carried out to document to be detected;
S62:Judge document to be detected whether successful connection, if it is not, then terminate;
S63:It orders if it succeeds, executing and shows result;
S64:Judge whether to terminate verification process, if it is not, then return to step continues to verify;
S65:If it is, disconnecting and discharging resource and terminate validating vulnerability.
3. a kind of Weblogic unserializings vulnerability scanning detection instrument, it is characterised in that:Including input module, vulnerability scanning mould
Block, Hole Detection module, loophole judgment module and loophole output module;
The input module, for obtaining document to be detected;
The vulnerability scanning module, for starting Weblogic unserializing vulnerability scanning detection instruments;
The Hole Detection module, for carrying out vulnerability scanning to document to be detected;
The loophole judgment module for judging that document to be detected whether there is loophole, and exports the vulnerability information of host;
The loophole output module, for exporting vulnerability scanning information;
Further include validating vulnerability module, connecting detection module and verification confirmation module;
The validating vulnerability module, for carrying out validating vulnerability to document to be detected;And export verification process result information;
The connecting detection module, for judge document to be detected whether successful connection, and show connection result;
The verification confirmation module, for disconnecting release resource and terminating validating vulnerability;
The vulnerability scanning module realizes Hole Detection process according to the following steps:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then current active subscriber is checked in long-range execution order;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then current active subscriber is checked in long-range execution order;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then return to step S326;
S328:If it is, terminating.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610382393.6A CN106096417B (en) | 2016-06-01 | 2016-06-01 | A kind of Weblogic unserializings vulnerability scanning detection method and tool |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610382393.6A CN106096417B (en) | 2016-06-01 | 2016-06-01 | A kind of Weblogic unserializings vulnerability scanning detection method and tool |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106096417A CN106096417A (en) | 2016-11-09 |
CN106096417B true CN106096417B (en) | 2018-10-26 |
Family
ID=57446866
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610382393.6A Active CN106096417B (en) | 2016-06-01 | 2016-06-01 | A kind of Weblogic unserializings vulnerability scanning detection method and tool |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106096417B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790031A (en) * | 2016-12-15 | 2017-05-31 | 四川长虹电器股份有限公司 | Open port test device and its processing method |
CN107423624B (en) * | 2017-04-12 | 2021-06-01 | 北京奇虎科技有限公司 | Terminal system vulnerability scanning method and device |
CN106993000A (en) * | 2017-05-26 | 2017-07-28 | 山东浪潮商用系统有限公司 | Solve method, Reverse Proxy and the system of unserializing leak |
CN108769063A (en) * | 2018-06-26 | 2018-11-06 | 郑州云海信息技术有限公司 | A kind of method and device of automatic detection WebLogic known bugs |
CN110276202B (en) * | 2019-06-24 | 2023-10-03 | 深圳前海微众银行股份有限公司 | Method and device for detecting reverse-serialization loopholes |
CN112329024B (en) * | 2020-11-17 | 2024-07-05 | 国网北京市电力公司 | Vulnerability detection method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103581193A (en) * | 2013-11-08 | 2014-02-12 | 星云融创(北京)信息技术有限公司 | Website vulnerability scanning method, device and system |
CN105320889A (en) * | 2015-02-10 | 2016-02-10 | 中国移动通信集团广东有限公司 | Security detection method and apparatus |
CN105429955A (en) * | 2015-10-30 | 2016-03-23 | 西安四叶草信息技术有限公司 | Remote vulnerability detection method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739663A (en) * | 2012-06-18 | 2012-10-17 | 奇智软件(北京)有限公司 | Detection method and scanning engine of web pages |
-
2016
- 2016-06-01 CN CN201610382393.6A patent/CN106096417B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103581193A (en) * | 2013-11-08 | 2014-02-12 | 星云融创(北京)信息技术有限公司 | Website vulnerability scanning method, device and system |
CN105320889A (en) * | 2015-02-10 | 2016-02-10 | 中国移动通信集团广东有限公司 | Security detection method and apparatus |
CN105429955A (en) * | 2015-10-30 | 2016-03-23 | 西安四叶草信息技术有限公司 | Remote vulnerability detection method |
Non-Patent Citations (1)
Title |
---|
Java反序列化漏洞研究;郭瑞;《网络安全和信息化》;20160331;第7卷(第3期);第27-30页 * |
Also Published As
Publication number | Publication date |
---|---|
CN106096417A (en) | 2016-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106096417B (en) | A kind of Weblogic unserializings vulnerability scanning detection method and tool | |
CN102769628B (en) | Page login method and server | |
US8171406B1 (en) | Automating user interface navigation | |
EP3575975B1 (en) | Method and apparatus for operating smart network interface card | |
CN112069490B (en) | Method and device for providing applet capability, electronic equipment and storage medium | |
CN103428159A (en) | Method for logging in to program and server | |
CN111488581A (en) | Weak password vulnerability detection method and device, electronic equipment and computer readable medium | |
CN113691602B (en) | Service processing method, system, device, equipment and medium based on cloud mobile phone | |
CN108712376B (en) | Verification method and device for server login | |
CN102957673A (en) | Method, device and system for processing information | |
CN111787030A (en) | Network security inspection method, device, equipment and storage medium | |
CN102841843B (en) | Compatible determination methods and device | |
CN113382015A (en) | Handling method, device, equipment and storage medium of network threat | |
CN109522202A (en) | A kind of method and apparatus of software test | |
AU2018390863B2 (en) | Computer system and method for extracting dynamic content from websites | |
CN109450887B (en) | Data transmission method, device and system | |
CN112995143B (en) | Safety reporting method, device, equipment and medium based on mail system | |
CN108471635B (en) | Method and apparatus for connecting wireless access points | |
CN107220092B (en) | Method for deploying software, control server, readable medium and storage controller | |
CN113676547B (en) | Data processing method, data processing device, storage medium and electronic equipment | |
CN105515874A (en) | Method for deploying network in virtual private cloud, related devices and deploying system | |
CN115834700A (en) | Access method, system, computing device and computer storage medium | |
US20240338308A1 (en) | Automated testing of user interfaces requiring a time-based one-time password (totp) | |
CN111259369A (en) | Man-machine identity verification method and system | |
CN111984893B (en) | System log configuration conflict reminding method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |