[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106096417B - A kind of Weblogic unserializings vulnerability scanning detection method and tool - Google Patents

A kind of Weblogic unserializings vulnerability scanning detection method and tool Download PDF

Info

Publication number
CN106096417B
CN106096417B CN201610382393.6A CN201610382393A CN106096417B CN 106096417 B CN106096417 B CN 106096417B CN 201610382393 A CN201610382393 A CN 201610382393A CN 106096417 B CN106096417 B CN 106096417B
Authority
CN
China
Prior art keywords
vulnerability
module
vulnerability scanning
weblogic
document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610382393.6A
Other languages
Chinese (zh)
Other versions
CN106096417A (en
Inventor
朱珠
韩世海
张森
张伟
雷娟
景钰文
杨峰
赵长松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of State Grid Chongqing Electric Power Co Ltd
State Grid Corp of China SGCC
State Grid Chongqing Electric Power Co Ltd
Original Assignee
Electric Power Research Institute of State Grid Chongqing Electric Power Co Ltd
State Grid Corp of China SGCC
State Grid Chongqing Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of State Grid Chongqing Electric Power Co Ltd, State Grid Corp of China SGCC, State Grid Chongqing Electric Power Co Ltd filed Critical Electric Power Research Institute of State Grid Chongqing Electric Power Co Ltd
Priority to CN201610382393.6A priority Critical patent/CN106096417B/en
Publication of CN106096417A publication Critical patent/CN106096417A/en
Application granted granted Critical
Publication of CN106096417B publication Critical patent/CN106096417B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of Weblogic unserializings vulnerability scanning detection methods, obtain document to be detected first;Start weblogic unserializing vulnerability scanning detection instruments;Then vulnerability scanning is carried out to document to be detected;Finally judge that document to be detected whether there is loophole, if it is, the vulnerability information of output host;If it is not, then return to step is continued to scan on until the end of scan.Weblogic unserializings vulnerability scanning detection method provided by the invention carries out vulnerability scanning, verification based on Java unserializings loophole to deployment Weblogic servers;Real-time search can be reached, stablized, it is reliably, quickly, easy to install and use.Can scanning validation be deployed with the server of weblogic and whether there is Java unserializing loopholes, and it is utilized, is simple and efficient, reduce manual intervention, realize automatic diagnostic function, support is provided safely for system.

Description

A kind of Weblogic unserializings vulnerability scanning detection method and tool
Technical field
The present invention relates to information security and webpage framework field, especially a kind of Weblogic unserializings vulnerability scanning inspection Survey method.
Background technology
WebLogic is a middleware based on JAVAEE frameworks, and WebLogic is for developing, integrating, dispose and manage Manage the Java application servers of large-scale distributed Web applications, network application and database application.By the dynamic function of Java and Among what the safety introducing catenet of Java Enterprise standards was applied develops, integrates, disposes and manages. Weblogic is widely used and the industry-by-industries such as telecommunications, finance, electric power, aviation, government.
Java serializings are exactly that object is converted into byte stream, convenient for being stored in memory, file, database;Antitone sequence It is inverse process to change, and object is reduced by byte stream.If Java apply to user input, i.e., can not letter data done unserializing Processing allows unserializing to generate unexpected object, unexpected object exists then attacker can input by constructing malice During generating it is possible to that arbitrary code is brought to execute.The tool is realized using this loophole.Same such middleware Maintenance also faces increasing challenge, and the core of client, crucial system are all deployed in Weblogic platforms, once occur tight Emergency occurs for weight loophole, causes to be vulnerable to attack, if cannot be resolved in time, consequence will be hardly imaginable.Network Upper same type tool, by taking WebLogic_EXP as an example, which can only carry out a target validating vulnerability, order executes Etc. functions.
Therefore, it is necessary to a kind of Weblogic unserializings vulnerability scanning detection methods.
Invention content
It is an object of the invention to provide a kind of Weblogic unserializings vulnerability scanning detection methods.
It is realized the purpose of the present invention is technical solution in this way:
A kind of Weblogic unserializings vulnerability scanning detection method provided by the invention, includes the following steps:
S1:Obtain document to be detected;
S2:Start Weblogic unserializing vulnerability scanning detection instruments;
S3:Vulnerability scanning is carried out to document to be detected;
S4:Judge that document to be detected whether there is loophole, if it is, the vulnerability information of output host;
S5:If it is not, then return to step is continued to scan on until the end of scan;
The vulnerability scanning is as follows:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then current active subscriber is checked in long-range execution order;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then current active subscriber is checked in long-range execution order;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then return to step S326;
S328:If it is, terminating.
Further, further comprising the steps of:
S61:Validating vulnerability is carried out to document to be detected;
S62:Judge document to be detected whether successful connection, if it is not, then terminate;
S63:It orders if it succeeds, executing and shows result;
S64:Judge whether to terminate verification process, if it is not, then return to step continues to verify;
S65:If it is, disconnecting and discharging resource and terminate validating vulnerability.
The present invention also provides a kind of Weblogic unserializings vulnerability scanning detection instruments, including input module, loophole Scan module, Hole Detection module, loophole judgment module and loophole output module;
The input module, for obtaining document to be detected;
The vulnerability scanning module, for starting Weblogic unserializing vulnerability scanning detection instruments;
The Hole Detection module, for carrying out vulnerability scanning to document to be detected;
The loophole judgment module for judging that document to be detected whether there is loophole, and exports the vulnerability information of host;
The loophole output module, for exporting vulnerability scanning information.
The input module of the present embodiment starts vulnerability scanning module by the scan button event response of setting;The loophole Scan module is connect with Hole Detection module;The Hole Detection module is connect with loophole judgment module;Loophole judgment module Structure is input to the output display of loophole output module;
Further include validating vulnerability module, connecting detection module and verification confirmation module;
The validating vulnerability module, for carrying out validating vulnerability to document to be detected;And export verification process result information;
The connecting detection module, for judge document to be detected whether successful connection, and show connection result;
The verification confirmation module, for disconnecting release resource and terminating validating vulnerability.
Button event response setting and startup interface are connected, validating vulnerability module is confirmed by connecting detection module and verification Module connects.Vulnerability scanning and validating vulnerability module enter the destination server of connection after passing through, subsequently into registration service Journey, and system command is executed, finally disconnect;
The vulnerability scanning module realizes Hole Detection process according to the following steps:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then current active subscriber is checked in long-range execution order;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then current active subscriber is checked in long-range execution order;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then return to step S326;
S328:If it is, terminating.
By adopting the above-described technical solution, the present invention has the advantage that:
Weblogic unserializings vulnerability scanning detection method provided by the invention, based on Java unserializing loopholes to portion It affixes one's name to Weblogic servers and carries out vulnerability scanning, verification;The tool is developed using Java, can be in installations such as Windows and Linux Have and run in the system of Java Runtime Environment, real-time search can be reached, stablizes, it is reliably, quickly, easy to install and use.It can be with The server that scanning validation is deployed with Weblogic whether there is Java unserializing loopholes, and be utilized to it, simple high Effect reduces manual intervention, realizes automatic diagnostic function, and support is provided safely for system.
Other advantages, target and the feature of the present invention will be illustrated in the following description to a certain extent, and And to a certain extent, based on will be apparent to those skilled in the art to investigating hereafter, Huo Zheke To be instructed from the practice of the present invention.The target and other advantages of the present invention can by following specification realizing and It obtains.
Description of the drawings
The description of the drawings of the present invention is as follows.
Fig. 1 is the Weblogic unserializing vulnerability scanning detection method flow charts of the present invention.
Fig. 2 is that the vulnerability scanning of the present invention verifies detection function call flow schematic diagram.
Fig. 3 is the vulnerability scanning flow chart of the present invention.
Specific implementation mode
The invention will be further described with reference to the accompanying drawings and examples.
Embodiment 1
As shown in Figs. 1-3, a kind of Weblogic unserializings vulnerability scanning detection method provided in this embodiment, including with Lower step:
S1:Obtain document to be detected;
S2:Start Weblogic unserializing vulnerability scanning detection instruments;
S3:Vulnerability scanning is carried out to document to be detected;
S4:Judge that document to be detected whether there is loophole, if it is, the vulnerability information of output host;
S5:If it is not, then return to step is continued to scan on until the end of scan.
It is further comprising the steps of:
S61:Validating vulnerability is carried out to document to be detected;
S62:Judge document to be detected whether successful connection, if it is not, then terminate;
S63:It orders if it succeeds, executing and shows result;
S64:Judge whether to terminate verification process, if it is not, then return to step continues to verify;
S65:If it is, disconnecting and discharging resource and terminate validating vulnerability.
The vulnerability scanning is as follows:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then long-range execute order whoami;
Current active subscriber is checked in the order whoami expressions of the present embodiment;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then long-range execute order whoami;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then;
S328:If it is, terminating.
The present embodiment additionally provides a kind of Weblogic unserializings vulnerability scanning detection instrument, comprises the following modules:
Input module, for obtaining document to be detected;
Vulnerability scanning module, for starting Weblogic unserializing vulnerability scanning detection instruments;
Hole Detection module, for carrying out vulnerability scanning to document to be detected;
Loophole judgment module for judging that document to be detected whether there is loophole, and exports the vulnerability information of host;
Loophole output module, for exporting vulnerability scanning information.
It is further comprising the steps of:
Validating vulnerability module, for carrying out validating vulnerability to document to be detected;And export verification process result information;
Connecting detection module, for judge document to be detected whether successful connection, and show connection result;
Confirmation module is verified, for disconnecting release resource and terminating validating vulnerability.
The vulnerability scanning module realizes Hole Detection process according to the following steps:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then long-range execute order whoami;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then long-range execute order whoami;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then return to step S326;
S328:If it is, terminating.
Embodiment 2
As shown in Fig. 2, Weblogic unserializings vulnerability scanning detection method provided in this embodiment, is used for vulnerability scanning And validating vulnerability:Weblogic unserializing vulnerability scanning detection instrument programs principal function, entrance are called first;Then initial Change Weblogic unserializing vulnerability scanning detection instrument main interfaces;Generate Weblogic unserializing vulnerability scanning detection instruments Main interface button;Select vulnerability scanning module thread, or selection validating vulnerability module thread;Connection Service device and registration letter Number;Execute command functions;Finally discharge contiguous function.The more host addresses of Weblogic unserializing vulnerability scannings detection support, Multiport vulnerability scanning.Friendly interface requires personnel ability low, suitable arbitrary personnel's use, friendly interface, to personnel ability It is required that it is low, it is suitble to arbitrary personnel to use, and custom command is supported to execute, scanning result and order is returned by echoing text box Implementing result understands scan progress, scanning result and command execution results in time.
Vulnerability scanning is as follows:
(1) IP address is inputted
Input needs the address scanned or the network segment in " IP address " text box, is separated with ", " between address, such as:It can It inputs " 192.168.1.2,192.168.1.1,192.168.2.0/24 ".
(2) input port range
The port scanned or port range defeated can be needed at " port range ", be connected with "-" between port range, port Between separated with ", ", such as:It can input " 232,342,7000-7010 ".
(3) input scanning thread
Scanning number of threads can be set at " scanning thread ".
(4) scanning result echoes
Scanning result can be echoed, there are loopholes for those hosts, preserve result hereof after the completion of scanning.
This method carries out vulnerability scanning to host within the scope of given network address, supports multiaddress, multiport, presses address The batch scannings such as section, port range.
Steps are as follows for validating vulnerability:
(1) IP address is inputted
Input needs to carry out the host IP address of validating vulnerability in " IP address " text box.
(2) input port
Input needs to carry out the host port of validating vulnerability in " port " text box.
(3) selection operation system
The OS Type of selection target host in " operating system " drop-down list.
(4) order executes
Input needs the order executed in " order " text box, and system command is executed by this tool.
(5) command result echoes:
Command execution results are echoed, judge whether order runs succeeded.
This method is executed to determining that host carries out validating vulnerability, utilization and order.
Embodiment 3
The present embodiment sweeps destination server by the tool that the detection of Weblogic unserializing vulnerability scannings generates It is illustrated for retouching.
1, vulnerability scanning
(1) " run.bat " is double-clicked, starts independent research weblogic_unserialize_tool tools, select " loophole Scanning " module;
(2) scan address range and port range are inputted, setting scans thread, such as:Address range is " 192.168.56.101,192.168.56.102 ", port range are " 7000-7010 ", and thread is set as 5;
(3) it clicks " scanning " button to be scanned, tool can show scan progress, and show that there are the host of loophole letters Breath;
2, validating vulnerability
(1) " validating vulnerability " module is selected, destination host information, and selection operation system are inputted, such as:Destination host IP For " 192.168.56.102 ", port is " 7001 ", and operating system is " Windows ";
(2) it clicks a " connect " button and is attached, relevant information is shown after successful connection;
(3) " execution " button is clicked after input order, tool will execute related command, and show implementing result, execute " whoami " and " ipconfig " is ordered.
(4) "off" button is clicked, tool will be switched off connecting and discharge resource.
Finally illustrate, the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although with reference to compared with Good embodiment describes the invention in detail, it will be understood by those of ordinary skill in the art that, it can be to the skill of the present invention Art scheme is modified or replaced equivalently, and without departing from the objective and range of the technical program, should all be covered in the present invention Claimed range in.

Claims (3)

1. a kind of Weblogic unserializings vulnerability scanning detection method, it is characterised in that:Include the following steps:
S1:Obtain document to be detected;
S2:Start Weblogic unserializing vulnerability scanning detection instruments;
S3:Vulnerability scanning is carried out to document to be detected;
S4:Judge that document to be detected whether there is loophole, if it is, the vulnerability information of output host;
S5:If it is not, then return to step is continued to scan on until the end of scan;
The vulnerability scanning is as follows:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then current active subscriber is checked in long-range execution order;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then current active subscriber is checked in long-range execution order;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then return to step S326;
S328:If it is, terminating.
2. Weblogic unserializings vulnerability scanning detection method as described in claim 1, it is characterised in that:Further include following Step:
S61:Validating vulnerability is carried out to document to be detected;
S62:Judge document to be detected whether successful connection, if it is not, then terminate;
S63:It orders if it succeeds, executing and shows result;
S64:Judge whether to terminate verification process, if it is not, then return to step continues to verify;
S65:If it is, disconnecting and discharging resource and terminate validating vulnerability.
3. a kind of Weblogic unserializings vulnerability scanning detection instrument, it is characterised in that:Including input module, vulnerability scanning mould Block, Hole Detection module, loophole judgment module and loophole output module;
The input module, for obtaining document to be detected;
The vulnerability scanning module, for starting Weblogic unserializing vulnerability scanning detection instruments;
The Hole Detection module, for carrying out vulnerability scanning to document to be detected;
The loophole judgment module for judging that document to be detected whether there is loophole, and exports the vulnerability information of host;
The loophole output module, for exporting vulnerability scanning information;
Further include validating vulnerability module, connecting detection module and verification confirmation module;
The validating vulnerability module, for carrying out validating vulnerability to document to be detected;And export verification process result information;
The connecting detection module, for judge document to be detected whether successful connection, and show connection result;
The verification confirmation module, for disconnecting release resource and terminating validating vulnerability;
The vulnerability scanning module realizes Hole Detection process according to the following steps:
S301:Obtain interface input information;
S302:Input information is handled, host address queue and port queue are generated;
S303:Flag information is arranged in initiation parameter;
S304:Judge whether Thread Count reaches the upper limit;
S305:If it is, entering step S327;
S306:If it is not, then newly-built thread, starts to scan;
S307:Judge whether host address queue is empty, if it is, entering step S326;
S308:If it is not, then obtaining destination address from host address queue;
S309:Judge whether to scan through all of the port, if it is, return to step S307;
S310:If it is not, then obtaining target port from port queue;
S311:Linking objective server;
S312:Judge whether connection succeeds, if it is not, then return to step S309;
S313:If it is, uploading windows packets;
S314:Registration service;
S315:Whether report an error, if it is, entering step S318;
S316:If it is not, then current active subscriber is checked in long-range execution order;
S317:Judge that order executes whether to succeed, if it is not, then entering step S318;
S318:If it is, output host information, confirms that there are loopholes;
S319:Upload liunux packets;
S320:Registration service;
S321:Judge whether to report an error, if it is, entering step S325;
S322:If it is not, then current active subscriber is checked in long-range execution order;
S323:Judge that order executes whether to succeed, if it is not, then entering step S325;
S324:If it is, output host information, confirms that there are loopholes;
S325:It disconnects;
S326:Thread exits;
S327:Judge whether thread all exits, if it is not, then return to step S326;
S328:If it is, terminating.
CN201610382393.6A 2016-06-01 2016-06-01 A kind of Weblogic unserializings vulnerability scanning detection method and tool Active CN106096417B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610382393.6A CN106096417B (en) 2016-06-01 2016-06-01 A kind of Weblogic unserializings vulnerability scanning detection method and tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610382393.6A CN106096417B (en) 2016-06-01 2016-06-01 A kind of Weblogic unserializings vulnerability scanning detection method and tool

Publications (2)

Publication Number Publication Date
CN106096417A CN106096417A (en) 2016-11-09
CN106096417B true CN106096417B (en) 2018-10-26

Family

ID=57446866

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610382393.6A Active CN106096417B (en) 2016-06-01 2016-06-01 A kind of Weblogic unserializings vulnerability scanning detection method and tool

Country Status (1)

Country Link
CN (1) CN106096417B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790031A (en) * 2016-12-15 2017-05-31 四川长虹电器股份有限公司 Open port test device and its processing method
CN107423624B (en) * 2017-04-12 2021-06-01 北京奇虎科技有限公司 Terminal system vulnerability scanning method and device
CN106993000A (en) * 2017-05-26 2017-07-28 山东浪潮商用系统有限公司 Solve method, Reverse Proxy and the system of unserializing leak
CN108769063A (en) * 2018-06-26 2018-11-06 郑州云海信息技术有限公司 A kind of method and device of automatic detection WebLogic known bugs
CN110276202B (en) * 2019-06-24 2023-10-03 深圳前海微众银行股份有限公司 Method and device for detecting reverse-serialization loopholes
CN112329024B (en) * 2020-11-17 2024-07-05 国网北京市电力公司 Vulnerability detection method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581193A (en) * 2013-11-08 2014-02-12 星云融创(北京)信息技术有限公司 Website vulnerability scanning method, device and system
CN105320889A (en) * 2015-02-10 2016-02-10 中国移动通信集团广东有限公司 Security detection method and apparatus
CN105429955A (en) * 2015-10-30 2016-03-23 西安四叶草信息技术有限公司 Remote vulnerability detection method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739663A (en) * 2012-06-18 2012-10-17 奇智软件(北京)有限公司 Detection method and scanning engine of web pages

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581193A (en) * 2013-11-08 2014-02-12 星云融创(北京)信息技术有限公司 Website vulnerability scanning method, device and system
CN105320889A (en) * 2015-02-10 2016-02-10 中国移动通信集团广东有限公司 Security detection method and apparatus
CN105429955A (en) * 2015-10-30 2016-03-23 西安四叶草信息技术有限公司 Remote vulnerability detection method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Java反序列化漏洞研究;郭瑞;《网络安全和信息化》;20160331;第7卷(第3期);第27-30页 *

Also Published As

Publication number Publication date
CN106096417A (en) 2016-11-09

Similar Documents

Publication Publication Date Title
CN106096417B (en) A kind of Weblogic unserializings vulnerability scanning detection method and tool
CN102769628B (en) Page login method and server
US8171406B1 (en) Automating user interface navigation
EP3575975B1 (en) Method and apparatus for operating smart network interface card
CN112069490B (en) Method and device for providing applet capability, electronic equipment and storage medium
CN103428159A (en) Method for logging in to program and server
CN111488581A (en) Weak password vulnerability detection method and device, electronic equipment and computer readable medium
CN113691602B (en) Service processing method, system, device, equipment and medium based on cloud mobile phone
CN108712376B (en) Verification method and device for server login
CN102957673A (en) Method, device and system for processing information
CN111787030A (en) Network security inspection method, device, equipment and storage medium
CN102841843B (en) Compatible determination methods and device
CN113382015A (en) Handling method, device, equipment and storage medium of network threat
CN109522202A (en) A kind of method and apparatus of software test
AU2018390863B2 (en) Computer system and method for extracting dynamic content from websites
CN109450887B (en) Data transmission method, device and system
CN112995143B (en) Safety reporting method, device, equipment and medium based on mail system
CN108471635B (en) Method and apparatus for connecting wireless access points
CN107220092B (en) Method for deploying software, control server, readable medium and storage controller
CN113676547B (en) Data processing method, data processing device, storage medium and electronic equipment
CN105515874A (en) Method for deploying network in virtual private cloud, related devices and deploying system
CN115834700A (en) Access method, system, computing device and computer storage medium
US20240338308A1 (en) Automated testing of user interfaces requiring a time-based one-time password (totp)
CN111259369A (en) Man-machine identity verification method and system
CN111984893B (en) System log configuration conflict reminding method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant