[go: up one dir, main page]

CN110879891B - Vulnerability detection method and device based on web fingerprint information - Google Patents

Vulnerability detection method and device based on web fingerprint information Download PDF

Info

Publication number
CN110879891B
CN110879891B CN201910747265.0A CN201910747265A CN110879891B CN 110879891 B CN110879891 B CN 110879891B CN 201910747265 A CN201910747265 A CN 201910747265A CN 110879891 B CN110879891 B CN 110879891B
Authority
CN
China
Prior art keywords
web
fingerprint information
penetration
information
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910747265.0A
Other languages
Chinese (zh)
Other versions
CN110879891A (en
Inventor
田跃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Secworld Information Technology Beijing Co Ltd
Qax Technology Group Inc
Original Assignee
Secworld Information Technology Beijing Co Ltd
Qax Technology Group Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Secworld Information Technology Beijing Co Ltd, Qax Technology Group Inc filed Critical Secworld Information Technology Beijing Co Ltd
Priority to CN201910747265.0A priority Critical patent/CN110879891B/en
Publication of CN110879891A publication Critical patent/CN110879891A/en
Application granted granted Critical
Publication of CN110879891B publication Critical patent/CN110879891B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供了一种基于web指纹信息的漏洞探测方法及装置,其中,该方法包括:确定渗透目标的web网站,其中,所述渗透目标为通过网络连接的网络系统;采集所述web网站的web指纹信息;使用所述web指纹信息探测所述渗透目标的对外漏洞。通过本发明,解决了相关技术中不能通过web指纹信息进行漏洞探测技术问题。

The present invention provides a vulnerability detection method and device based on web fingerprint information, wherein the method comprises: determining a web site of a penetration target, wherein the penetration target is a network system connected through a network; collecting web fingerprint information of the web site; and using the web fingerprint information to detect external vulnerabilities of the penetration target. The present invention solves the technical problem that vulnerability detection cannot be performed through web fingerprint information in the related art.

Description

基于web指纹信息的漏洞探测方法及装置Vulnerability detection method and device based on web fingerprint information

技术领域Technical Field

本发明涉及网络安全领域,具体而言,涉及一种基于web指纹信息的漏洞探测方法及装置。The present invention relates to the field of network security, and in particular to a vulnerability detection method and device based on web fingerprint information.

背景技术Background Art

网络攻击是黑客或者病毒木马等对电子设备发起的攻击,通过窃取文件等给用户带来了巨大损失,而渗透测试正是模拟网络攻击的过程,以提前发现问题,及时弥补,有备无患。A cyber attack is an attack on electronic devices by hackers or viruses and Trojans, which causes huge losses to users by stealing files. Penetration testing is the process of simulating cyber attacks in order to discover problems in advance, remedy them in time, and be prepared for any eventuality.

相关技术中,一般只能针对已知构架信息的网站进行攻击,不会采集web网站的构架信息目前市面上指纹识别方法比较单一,无法支持特殊指纹的识别,识别规则存在大量的误报。In the related technology, generally only websites with known structure information can be attacked, and the structure information of the web site will not be collected. Currently, the fingerprint recognition methods on the market are relatively simple and cannot support the recognition of special fingerprints. There are a large number of false positives in the recognition rules.

针对相关技术中存在的上述问题,目前尚未发现有效的解决方案。With respect to the above-mentioned problems existing in the related technologies, no effective solutions have been found so far.

发明内容Summary of the invention

本发明实施例提供了一种基于web指纹信息的漏洞探测方法及装置。The embodiment of the present invention provides a vulnerability detection method and device based on web fingerprint information.

根据本发明的一个实施例,提供了一种基于web指纹信息的漏洞探测方法,包括:确定渗透目标的web网站,其中,所述渗透目标为通过网络连接的网络系统;采集所述web网站的web指纹信息;使用所述web指纹信息探测所述渗透目标的对外漏洞。According to one embodiment of the present invention, a vulnerability detection method based on web fingerprint information is provided, comprising: determining a web site of a penetration target, wherein the penetration target is a network system connected via a network; collecting web fingerprint information of the web site; and using the web fingerprint information to detect external vulnerabilities of the penetration target.

可选的,采集所述web网站的web指纹信息包括:采集所述web网站的以下构架信息至少之一:开发语言、部署服务器的操作系统、中间件、使用的第三方代码通用框架、内容管理系统CMS、内容分发网络CDN。Optionally, collecting web fingerprint information of the web site includes: collecting at least one of the following architecture information of the web site: development language, operating system of the deployment server, middleware, third-party code common framework used, content management system CMS, content distribution network CDN.

可选的,采集所述web网站的web指纹信息包括:向所述web网站的网站服务器发送超文本传输协议HTTP请求;接收所述web网站基于所述HTTP请求反馈的网页信息;根据所述网页信息检测所述web指纹信息。Optionally, collecting the web fingerprint information of the web site includes: sending a Hypertext Transfer Protocol (HTTP) request to a website server of the web site; receiving web page information fed back by the web site based on the HTTP request; and detecting the web fingerprint information according to the web page information.

可选的,根据所述网页信息检测所述web指纹信息包括:查找所述网页信息中的状态码;根据所述状态码判断所述web网站是否存在指定页面;根据所述指定页面确定所述web指纹信息。Optionally, detecting the web fingerprint information according to the web page information includes: searching for a status code in the web page information; judging whether a designated page exists on the web site according to the status code; and determining the web fingerprint information according to the designated page.

可选的,根据所述网页信息检测所述web指纹信息包括:识别所述网页信息中指定文件的HASH值;根据所述HASH值确定所述web指纹信息。Optionally, detecting the web fingerprint information according to the web page information includes: identifying a HASH value of a specified file in the web page information; and determining the web fingerprint information according to the HASH value.

可选的,根据所述网页信息检测所述web指纹信息包括:在网页源码的数据包正文中查找指定关键字,和/或,在网页源码的数据包包头中查找指定字符串,和/或,在网页源码的数据包包头中查找规则字符串,其中,所述网页信息包括所述网页源码,所述规则字符串是采用正则表达式设置的字符串组合;根据以下至少之一确定所述web指纹信息:所述指定关键字、所述指定字符串、规则字符串。Optionally, detecting the web fingerprint information according to the web page information includes: searching for a specified keyword in the data packet body of the web page source code, and/or searching for a specified string in the data packet header of the web page source code, and/or searching for a regular string in the data packet header of the web page source code, wherein the web page information includes the web page source code, and the regular string is a string combination set using a regular expression; determining the web fingerprint information according to at least one of the following: the specified keyword, the specified string, and the regular string.

可选的,在使用所述web指纹信息探测所述渗透目标的对外漏洞之后,所述方法还包括:利用所述对外漏洞获取所述渗透目标的操作权限;使用所述操作权限对所述网络系统执行渗透操作。Optionally, after using the web fingerprint information to detect the external vulnerability of the penetration target, the method further includes: using the external vulnerability to obtain the operation authority of the penetration target; and using the operation authority to perform a penetration operation on the network system.

可选的,使用所述web指纹信息探测所述渗透目标的对外漏洞包括:在预设插件库中选择与所述web指纹信息匹配的检测插件;调用所述检测插件识别所述渗透目标提供的对外服务端口。Optionally, using the web fingerprint information to detect external vulnerabilities of the penetration target includes: selecting a detection plug-in that matches the web fingerprint information in a preset plug-in library; and calling the detection plug-in to identify an external service port provided by the penetration target.

根据本发明的另一个实施例,提供了一种基于web指纹信息的漏洞探测装置,包括:确定模块,用于确定渗透目标的web网站,其中,所述渗透目标为通过网络连接的网络系统;采集模块,用于采集所述web网站的web指纹信息;探测模块,用于使用所述web指纹信息探测所述渗透目标的对外漏洞。According to another embodiment of the present invention, a vulnerability detection device based on web fingerprint information is provided, including: a determination module, used to determine a web website of a penetration target, wherein the penetration target is a network system connected through a network; a collection module, used to collect web fingerprint information of the web website; and a detection module, used to use the web fingerprint information to detect external vulnerabilities of the penetration target.

可选的,所述采集模块包括:采集单元,用于采集所述web网站的以下构架信息至少之一:开发语言、部署服务器的操作系统、中间件、使用的第三方代码通用框架、内容管理系统CMS、内容分发网络CDN。Optionally, the acquisition module includes: a collection unit, used to collect at least one of the following architecture information of the web site: development language, operating system of the deployment server, middleware, third-party code general framework used, content management system CMS, content distribution network CDN.

可选的,所述采集模块包括:发送单元,用于向所述web网站的网站服务器发送超文本传输协议HTTP请求;接收单元,用于接收所述web网站基于所述HTTP请求反馈的网页信息;检测单元,用于根据所述网页信息检测所述web指纹信息。Optionally, the acquisition module includes: a sending unit, used to send a Hypertext Transfer Protocol HTTP request to the website server of the web website; a receiving unit, used to receive web page information fed back by the web website based on the HTTP request; and a detection unit, used to detect the web fingerprint information based on the web page information.

可选的,所述检测单元包括:第一查找子单元,用于查找所述网页信息中的状态码;判断子单元,用于根据所述状态码判断所述web网站是否存在指定页面;第一确定子单元,用于根据所述指定页面确定所述web指纹信息。Optionally, the detection unit includes: a first search subunit, used to search for a status code in the web page information; a judgment subunit, used to judge whether a specified page exists on the web site based on the status code; and a first determination subunit, used to determine the web fingerprint information based on the specified page.

可选的,所述检测单元包括:识别子单元,用于识别所述网页信息中指定文件的HASH值;第二确定子单元,用于根据所述HASH值确定所述web指纹信息。Optionally, the detection unit includes: an identification subunit, used to identify the HASH value of a specified file in the web page information; and a second determination subunit, used to determine the web fingerprint information according to the HASH value.

可选的,所述检测单元包括:第二查找子单元,用于在网页源码的数据包正文中查找指定关键字,和/或,在网页源码的数据包包头中查找指定字符串,和/或,在网页源码的数据包包头中查找规则字符串,其中,所述网页信息包括所述网页源码,所述规则字符串是采用正则表达式设置的字符串组合;第三确定子单元,用于根据以下至少之一确定所述web指纹信息:所述指定关键字、所述指定字符串、规则字符串。Optionally, the detection unit includes: a second search subunit, used to search for specified keywords in the data packet body of the web page source code, and/or, search for specified strings in the data packet header of the web page source code, and/or, search for regular strings in the data packet header of the web page source code, wherein the web page information includes the web page source code, and the regular string is a string combination set using a regular expression; a third determination subunit, used to determine the web fingerprint information based on at least one of the following: the specified keyword, the specified string, and the regular string.

可选的,所述装置还包括:获取模块,用于在所述探测模块使用所述web指纹信息探测所述渗透目标的对外漏洞之后,利用所述对外漏洞获取所述渗透目标的操作权限;渗透模块,用于使用所述操作权限对所述网络系统执行渗透操作。Optionally, the device also includes: an acquisition module, which is used to obtain the operation authority of the penetration target by using the external vulnerability after the detection module uses the web fingerprint information to detect the external vulnerability of the penetration target; and a penetration module, which is used to use the operation authority to perform penetration operations on the network system.

可选的,所述探测模块包括:选择单元,用于在预设插件库中选择与所述web指纹信息匹配的检测插件;识别单元,用于调用所述检测插件识别所述渗透目标提供的对外服务端口。Optionally, the detection module includes: a selection unit, used to select a detection plug-in matching the web fingerprint information in a preset plug-in library; and an identification unit, used to call the detection plug-in to identify the external service port provided by the penetration target.

根据本发明的又一个实施例,还提供了一种存储介质,所述存储介质中存储有计算机程序,其中,所述计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。According to yet another embodiment of the present invention, a storage medium is provided, in which a computer program is stored, wherein the computer program is configured to execute the steps of any one of the above method embodiments when running.

根据本发明的又一个实施例,还提供了一种电子装置,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器被设置为运行所述计算机程序以执行上述任一项方法实施例中的步骤。According to yet another embodiment of the present invention, there is provided an electronic device, including a memory and a processor, wherein the memory stores a computer program, and the processor is configured to run the computer program to execute the steps in any one of the above method embodiments.

通过本发明,确定渗透目标的web网站,然后采集web网站的web指纹信息,最后在局域网的外网使用web指纹信息探测渗透目标的对外漏洞,解决了相关技术中不能通过web指纹信息进行漏洞探测技术问题,可以在渗透测试时发现更多的网络漏洞。Through the present invention, the web site of the penetration target is determined, and then the web fingerprint information of the web site is collected. Finally, the web fingerprint information is used in the external network of the local area network to detect the external vulnerabilities of the penetration target, which solves the technical problem that the vulnerability detection cannot be performed through the web fingerprint information in the related technology, and more network vulnerabilities can be discovered during the penetration test.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The drawings described herein are used to provide a further understanding of the present invention and constitute a part of this application. The exemplary embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute an improper limitation of the present invention. In the drawings:

图1是本发明实施例的一种基于web指纹信息的漏洞探测计算机设备的硬件结构框图;FIG1 is a hardware structure block diagram of a computer device for detecting vulnerabilities based on web fingerprint information according to an embodiment of the present invention;

图2是根据本发明实施例的一种基于web指纹信息的漏洞探测方法的流程图;FIG2 is a flow chart of a vulnerability detection method based on web fingerprint information according to an embodiment of the present invention;

图3是本发明实施例通过识别web指纹信息的逻辑流程图;FIG3 is a logic flow chart of an embodiment of the present invention through identifying web fingerprint information;

图4是本发明实施例任务节点针对渗透目标的攻击线路图;FIG4 is an attack route diagram of a task node against a penetration target according to an embodiment of the present invention;

图5是根据本发明实施例的基于web指纹信息的漏洞探测装置的结构框图。FIG. 5 is a structural block diagram of a vulnerability detection device based on web fingerprint information according to an embodiment of the present invention.

具体实施方式DETAILED DESCRIPTION

为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分的实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本申请保护的范围。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。In order to enable those skilled in the art to better understand the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only embodiments of a part of the present application, not all embodiments. Based on the embodiments in the present application, all other embodiments obtained by ordinary technicians in the field without creative work should fall within the scope of protection of the present application. It should be noted that the embodiments in the present application and the features in the embodiments can be combined with each other without conflict.

需要说明的是,本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。It should be noted that the terms "first", "second", etc. in the specification and claims of the present application and the above-mentioned drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. It should be understood that the data used in this way can be interchangeable where appropriate, so that the embodiments of the present application described herein can be implemented in an order other than those illustrated or described herein. In addition, the terms "including" and "having" and any of their variations are intended to cover non-exclusive inclusions, for example, a process, method, system, product or device comprising a series of steps or units is not necessarily limited to those steps or units clearly listed, but may include other steps or units that are not clearly listed or inherent to these processes, methods, products or devices.

实施例1Example 1

本申请实施例一所提供的方法实施例可以在计算机设备或者类似的运算装置中执行。以运行在计算机设备上为例,图1是本发明实施例的一种基于web指纹信息的漏洞探测计算机设备的硬件结构框图。如图1所示,计算机设备10可以包括一个或多个(图1中仅示出一个)处理器102(处理器102可以包括但不限于微处理器MCU或可编程逻辑器件FPGA等的处理装置)和用于存储数据的存储器104,可选地,上述计算机设备还可以包括用于通信功能的传输设备106以及输入输出设备108。本领域普通技术人员可以理解,图1所示的结构仅为示意,其并不对上述计算机设备的结构造成限定。例如,计算机设备10还可包括比图1中所示更多或者更少的组件,或者具有与图1所示不同的配置。The method embodiment provided in the first embodiment of the present application can be executed in a computer device or a similar computing device. Taking running on a computer device as an example, FIG1 is a hardware structure block diagram of a computer device for vulnerability detection based on web fingerprint information according to an embodiment of the present invention. As shown in FIG1 , a computer device 10 may include one or more (only one is shown in FIG1 ) processors 102 (the processor 102 may include but is not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data. Optionally, the computer device may also include a transmission device 106 and an input/output device 108 for communication functions. It can be understood by a person skilled in the art that the structure shown in FIG1 is only for illustration and does not limit the structure of the computer device. For example, the computer device 10 may also include more or fewer components than those shown in FIG1 , or have a configuration different from that shown in FIG1 .

存储器104可用于存储计算机程序,例如,应用软件的软件程序以及模块,如本发明实施例中的一种基于web指纹信息的漏洞探测方法对应的计算机程序,处理器102通过运行存储在存储器104内的计算机程序,从而执行各种功能应用以及数据处理,即实现上述的方法。存储器104可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器104可进一步包括相对于处理器102远程设置的存储器,这些远程存储器可以通过网络连接至计算机设备10。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory 104 can be used to store computer programs, for example, software programs and modules of application software, such as a computer program corresponding to a vulnerability detection method based on web fingerprint information in an embodiment of the present invention. The processor 102 executes various functional applications and data processing by running the computer program stored in the memory 104, that is, to implement the above method. The memory 104 may include a high-speed random access memory, and may also include a non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include a memory remotely arranged relative to the processor 102, and these remote memories may be connected to the computer device 10 via a network. Examples of the above network include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.

传输装置106用于经由一个网络接收或者发送数据。上述的网络具体实例可包括计算机设备10的通信供应商提供的无线网络。在一个实例中,传输装置106包括一个网络适配器(Network Interface Controller,简称为NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输装置106可以为射频(Radio Frequency,简称为RF)模块,其用于通过无线方式与互联网进行通讯。The transmission device 106 is used to receive or send data via a network. The specific example of the above network may include a wireless network provided by a communication provider of the computer device 10. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, referred to as NIC), which can be connected to other network devices through a base station so as to communicate with the Internet. In one example, the transmission device 106 can be a radio frequency (RF) module, which is used to communicate with the Internet wirelessly.

在本实施例中提供了一种基于web指纹信息的漏洞探测方法,图2是根据本发明实施例的一种基于web指纹信息的漏洞探测方法的流程图,如图2所示,该流程包括如下步骤:In this embodiment, a vulnerability detection method based on web fingerprint information is provided. FIG. 2 is a flow chart of a vulnerability detection method based on web fingerprint information according to an embodiment of the present invention. As shown in FIG. 2 , the process includes the following steps:

步骤S202,确定渗透目标的web网站,其中,所述渗透目标为通过网络连接的网络系统;Step S202, determining a website of a penetration target, wherein the penetration target is a network system connected through a network;

本实施例的渗透目标是由硬件、软件和网络构成的网络系统,运行在局域网内,通过交换机、防火墙等与广域网隔离,网络系统包括电子设备和数据程序,网络系统包括服务器、数据库,业务系统,接入局域网的电子设备,电子设备安装的操作系统等,应用在各种场景,如保密性较强或安全需求较强的单位,具体如政府机关的内网,金融结构的局域网等。The penetration target of this embodiment is a network system composed of hardware, software and network, which runs in a local area network and is isolated from the wide area network by switches, firewalls, etc. The network system includes electronic equipment and data programs. The network system includes servers, databases, business systems, electronic equipment connected to the local area network, operating systems installed on electronic equipment, etc. It is used in various scenarios, such as units with strong confidentiality or security requirements, such as the intranet of government agencies, the local area network of financial structures, etc.

步骤S204,采集所述web网站的web指纹信息;Step S204, collecting web fingerprint information of the web site;

步骤S206,使用所述web指纹信息探测所述渗透目标的对外漏洞。Step S206: Use the web fingerprint information to detect external vulnerabilities of the penetration target.

本实施例的漏洞是在硬件、软件、协议的具体实现或系统安全策略上存在的缺陷,从而可以使攻击者能够在未授权的情况下访问或破坏系统,本实施例的对外漏洞为可以被第三方设备利用的网络系统的缺陷。The vulnerability of this embodiment is a defect in the specific implementation of the hardware, software, protocol or system security policy, which can enable an attacker to access or damage the system without authorization. The external vulnerability of this embodiment is a defect in the network system that can be exploited by third-party devices.

通过上述步骤,确定渗透目标的web网站,然后采集web网站的web指纹信息,最后在局域网的外网使用web指纹信息探测渗透目标的对外漏洞,解决了相关技术中不能通过web指纹信息进行漏洞探测技术问题,可以在渗透测试时发现更多的网络漏洞。Through the above steps, the web site of the penetration target is determined, and then the web fingerprint information of the web site is collected. Finally, the web fingerprint information is used in the external network of the local area network to detect the external vulnerabilities of the penetration target. This solves the technical problem that the vulnerability detection technology cannot be performed through web fingerprint information in related technologies, and more network vulnerabilities can be discovered during penetration testing.

本实施例的执行主体可以是电脑,平板等电子设备,该电子设备连接在渗透目标所在的局域网,或者连接在广域网内。The execution subject of this embodiment can be a computer, tablet or other electronic device, which is connected to the local area network where the penetration target is located, or connected to the wide area network.

在本实施例中,采集web网站的web指纹信息包括:采集web网站的以下构架信息至少之一:开发语言、部署服务器的操作系统、中间件、使用的第三方代码通用框架、内容管理系统CMS、内容分发网络CDN。本实施例的web指纹信息为多种类型的构架信息组成的信息,在此进行举例说明:CMS信息:比如大汉CMS、织梦、帝国CMS、phpcms、ecshop等;前端技术:比如HTML5、jquery、bootstrap、pure、ace等;web服务器:比如Apache、lighttpd,Nginx,IIS等;应用服务器:比如Tomcat、Jboss、weblogic、websphere等;开发语言:比如PHP、Java、Ruby、Python、C#等;操作系统信息:比如linux、win2k8、win7、kali、centos等;CDN信息:是否使用CDN,以及使用哪一类CDN,如cloudflare、360cdn、365cyd、yunjiasu等;WAF信息:是否使用waf,以及使用哪一类waf,如Topsec、Jiasule、Yundun等;IP及域名信息:IP和域名注册信息、服务商信息等;端口信息:有些软件或平台还会探测服务器开放的常见端口。In this embodiment, collecting web fingerprint information of a website includes collecting at least one of the following architecture information of the website: development language, operating system of the deployment server, middleware, third-party code common framework used, content management system CMS, content distribution network CDN. The web fingerprint information of this embodiment is composed of various types of architecture information, and examples are given here: CMS information: such as Dahan CMS, Dreamweaver, Empire CMS, phpcms, ecshop, etc.; front-end technology: such as HTML5, jquery, bootstrap, pure, ace, etc.; web server: such as Apache, lighttpd, Nginx, IIS, etc.; application server: such as Tomcat, Jboss, weblogic, websphere, etc.; development language: such as PHP, Java, Ruby, Python, C#, etc.; operating system information: such as linux, win2k8, win7, kali, centos, etc.; CDN information: whether CDN is used, and which type of CDN is used, such as cloudflare, 360cdn, 365cyd, yunjiasu, etc.; WAF information: whether waf is used, and which type of waf is used, such as Topsec, Jiasule, Yundun, etc.; IP and domain name information: IP and domain name registration information, service provider information, etc.; port information: some software or platforms will also detect common ports opened by the server.

在本实施例的一个实施方式中,采集web网站的web指纹信息包括:In one implementation of this embodiment, collecting web fingerprint information of a website includes:

S11,向web网站的网站服务器发送超文本传输协议HTTP请求;S11, sending a Hypertext Transfer Protocol HTTP request to the website server of the web website;

本实施例的HTTP请求可以但不限于为:GET、POST、HEAD、自定义请求头等多种请求方;The HTTP request of this embodiment can be, but is not limited to, GET, POST, HEAD, custom request headers, and other request methods;

S12,接收web网站基于HTTP请求反馈的网页信息;S12, receiving web page information fed back by the web site based on the HTTP request;

S13,根据网页信息检测web指纹信息。S13, detecting web fingerprint information according to the web page information.

在一个可选的示例中,根据网页信息检测web指纹信息包括:查找网页信息中的状态码;根据状态码判断web网站是否存在指定页面;根据指定页面确定web指纹信息。In an optional example, detecting web fingerprint information according to web page information includes: searching for a status code in the web page information; judging whether a designated page exists on the web site according to the status code; and determining web fingerprint information according to the designated page.

在一个可选的示例中,根据网页信息检测web指纹信息包括:识别网页信息中指定文件的HASH值;根据HASH值确定web指纹信息。In an optional example, detecting web fingerprint information according to web page information includes: identifying a HASH value of a specified file in the web page information; and determining the web fingerprint information according to the HASH value.

在一个可选的示例中,根据网页信息检测web指纹信息包括:在网页源码的数据包正文中查找指定关键字,和/或,在网页源码的数据包包头中查找指定字符串,和/或,在网页源码的数据包包头中查找规则字符串,其中,网页信息包括网页源码,规则字符串是采用正则表达式设置的字符串组合;根据以下至少之一确定web指纹信息:指定关键字、指定字符串、规则字符串。In an optional example, detecting web fingerprint information based on web page information includes: searching for specified keywords in the body of a data packet of a web page source code, and/or searching for specified strings in a data packet header of a web page source code, and/or searching for regular strings in a data packet header of a web page source code, wherein the web page information includes the web page source code, and the regular string is a string combination set using a regular expression; determining the web fingerprint information based on at least one of the following: specified keywords, specified strings, and regular strings.

在本实施例的一个实施方式中,在是识别CMS时,可以通过特定文件的MD5来识别CMS,一些网站的特定图片文件、js文件、CSS等静态文件,如favicon.ico、css、logo.ico、js等文件一般不会修改,通过爬虫对这些文件进行抓取并比对md5值,如果和规则库中的Md5一致则说明是同一CMS。或者通过正常页面或错误网页中包含的关键字来识别,正常页面或错误网页中包含的关键字,先访问首页或特定页面如robots.txt等,通过正则的方式去匹配某些关键字,如Powered by Discuz、dedecms等。或者可以构造错误页面,根据报错信息来判断使用的CMS或者中间件信息,比较常见的如tomcat的报错页面。In one implementation of this embodiment, when identifying CMS, CMS can be identified by MD5 of specific files. Specific image files, js files, CSS and other static files of some websites, such as favicon.ico, css, logo.ico, js and other files are generally not modified. These files are captured by crawlers and compared with the md5 value. If it is consistent with the Md5 in the rule library, it means that it is the same CMS. Or it can be identified by keywords contained in normal pages or error pages. Keywords contained in normal pages or error pages, first visit the homepage or specific pages such as robots.txt, etc., and match certain keywords through regular methods, such as Powered by Discuz, dedecms, etc. Or an error page can be constructed to determine the CMS or middleware information used based on the error information, such as the more common error page of tomcat.

本实施例还可以通过网站服务器反馈的网页信息的请求头信息的关键字匹配web指纹信息。根据网站返回的响应头信息进行关键字匹配,whatweb和Wappalyzer就是通过banner信息来快速识别指纹。根据response header(响应头)有以下几种识别方式:查看http响应报头的X-Powered-By字段来识别;根据Cookies来进行判断,比如一些waf会在返回头中包含一些信息,如360wzws、Safedog、yunsuo等;根据header中的Server信息来判断,如DVRDVS-webs、yunjiasu-nginx、Mod_Security、nginx-wallarm等;根据WWW-Authenticate进行判断,一些路由交换设备可能存在这个字段,如NETCORE、huawei、h3c等设备。This embodiment can also match web fingerprint information through keywords in the request header information of the web page information fed back by the website server. Keyword matching is performed based on the response header information returned by the website. Whatweb and Wappalyzer quickly identify fingerprints through banner information. There are several identification methods based on the response header: check the X-Powered-By field of the http response header to identify; judge based on Cookies, for example, some waf will contain some information in the return header, such as 360wzws, Safedog, yunsuo, etc.; judge based on the Server information in the header, such as DVRDVS-webs, yunjiasu-nginx, Mod_Security, nginx-wallarm, etc.; judge based on WWW-Authenticate, some routing switching devices may have this field, such as NETCORE, Huawei, h3c and other devices.

本实施例还可以通过指定URL中包含的关键字,比如wp-includes、dede等URL关键特征来识别web指纹信息。通过规则库去探测是否有相应目录,或者根据爬虫结果对链接url进行分析,或者对robots.txt文件中目录进行检测等等方式,通过url地址来判别是否使用了某CMS,比如wordpress默认存在wp-includes和wp-admin目录,织梦站点默认管理后台为dede目录,solr平台可能使用/solr目录,weblogic可以使用wls-wsat目录等。This embodiment can also identify web fingerprint information by specifying keywords contained in the URL, such as wp-includes, dede and other URL key features. Use the rule base to detect whether there is a corresponding directory, or analyze the link URL according to the crawler results, or detect the directory in the robots.txt file, etc., to determine whether a certain CMS is used through the URL address. For example, wordpress has wp-includes and wp-admin directories by default, the default management backend of the dream weaving site is the dede directory, the solr platform may use the /solr directory, and weblogic can use the wls-wsat directory.

在识别开发语言时,web开发语言一般常见的有PHP、jsp、aspx、asp等,识别方式有:通过爬虫获取动态链接进行直接判断是比较简便的方法。Asp的判别规则如下:<a[^>]*?href=('|")[^http][^>]*?\.asp(\?|\#|\1),其他语言可替换相应asp即可;通过站http响应头部的X-Powered-By作为关键字来定位和识别;通过Set-Cookie进行识别,比如Set-Cookie中包含PHPSSIONID说明是php、包含JSESSIONID说明是java、包含ASP.NET_SessionId说明是aspx等。When identifying the development language, the common web development languages are PHP, jsp, aspx, asp, etc. The identification methods are as follows: directly judging by crawling to obtain dynamic links is a relatively simple method. The identification rules of Asp are as follows: <a[^>]*? href=('|")[^http][^>]*?\.asp(\?|\#|\1), other languages can be replaced with the corresponding asp; locate and identify by using X-Powered-By in the http response header of the station as a keyword; identify by Set-Cookie, for example, if Set-Cookie contains PHPSSIONID, it means it is php, if it contains JSESSIONID, it means it is java, if it contains ASP.NET_SessionId, it means it is aspx, etc.

图3是本发明实施例通过识别web指纹信息的逻辑流程图,web指纹信息中的各个信息(如,webCMS,中间件,开发语言等)对应一套指纹识别规则。FIG3 is a logic flow chart of an embodiment of the present invention through identifying web fingerprint information, where each piece of information in the web fingerprint information (eg, webCMS, middleware, development language, etc.) corresponds to a set of fingerprint identification rules.

本实施例中,web指纹识别主要是用于发现web网站的架构信息,以便于更深入的挖掘网站存在的漏洞。例如,开发语言、部署服务器的操作系统、中间件、使用的第三方代码通用框架等,发现手段如下:通过判断指定页面是否存在;通过识别某个特殊文件的HASH值;指定页面内容中的关键字;数据响应包头信息中特有的标记字符串或者规则。In this embodiment, web fingerprint recognition is mainly used to discover the architecture information of the web site, so as to more deeply explore the vulnerabilities existing in the website. For example, the development language, the operating system of the deployment server, the middleware, the third-party code common framework used, etc. The discovery means are as follows: by judging whether the specified page exists; by identifying the HASH value of a special file; by specifying keywords in the page content; and by unique marking strings or rules in the data response header information.

可选的,在在局域网的外网使用web指纹信息探测渗透目标的对外漏洞之后,还包括:利用对外漏洞获取渗透目标的操作权限;使用操作权限对网络系统执行渗透操作。其中,渗透操作包括以下至少之一:访问渗透目标的业务系统,访问渗透目标的本地数据,在渗透目标的内网进行横向渗透。业务系统包括网站服务器,数据库等,如频繁访问网站服务器,频繁发送相同的指令等,在业务系统超过处理上限时,有可能会导致宕机或崩溃,本实施例的本地数据包括局域网内可分享的数据,以及通过局域网连接的各个设备内保存的数据等。Optionally, after using web fingerprint information to detect external vulnerabilities of the penetration target in the external network of the local area network, it also includes: using the external vulnerabilities to obtain the operating authority of the penetration target; using the operating authority to perform penetration operations on the network system. Among them, the penetration operation includes at least one of the following: accessing the business system of the penetration target, accessing the local data of the penetration target, and performing lateral penetration in the intranet of the penetration target. The business system includes website servers, databases, etc., such as frequent access to website servers, frequent sending of the same instructions, etc., when the business system exceeds the processing limit, it may cause downtime or crash. The local data of this embodiment includes data that can be shared in the local area network, as well as data stored in various devices connected through the local area network, etc.

本实施例对探测到的可利用的漏洞进行封装,把复杂的漏洞利用过程集成到插件库中,在需要进行漏洞利用时,即可执行响应的输入一键获取回显结果,比如执行系统命令,对于用户而言只需要输入想要执行的命令,点击执行按钮(或者系统自动触发),即可获取命令执行结果,不需要关心漏洞的复杂利用过程。例如,发现weblogic反序列化漏洞后可以直接通过高级利用功能执行命令、上传文件、反弹交互shell等操作。渗透人员只需要输入目标地址,即可一键进行漏洞的发现和利用过程。针对一些无法完全自动化发现的漏洞提供了单独漏洞利用的功能,渗透人员只需要输入相应的参数即可一键利用漏洞,例如对fastjson漏洞的利用。同时也可用于已知漏洞的利用,比如输入oracle账号密码、一键提权、执行系统命令等。此功能大大简化了漏洞利用过程。This embodiment encapsulates the exploitable vulnerabilities detected, and integrates the complex vulnerability exploitation process into the plug-in library. When it is necessary to exploit the vulnerability, the response input can be executed to obtain the echo result with one key, such as executing a system command. For the user, it is only necessary to enter the command to be executed and click the execute button (or the system automatically triggers) to obtain the command execution result, without having to care about the complex exploitation process of the vulnerability. For example, after discovering the weblogic deserialization vulnerability, it is possible to directly execute commands, upload files, rebound interactive shells and other operations through advanced exploitation functions. The penetration personnel only need to enter the target address to perform the discovery and exploitation process of the vulnerability with one key. For some vulnerabilities that cannot be fully automatically discovered, a separate vulnerability exploitation function is provided. The penetration personnel only need to enter the corresponding parameters to exploit the vulnerability with one key, such as the exploitation of the fastjson vulnerability. It can also be used for the exploitation of known vulnerabilities, such as entering an oracle account password, one-key privilege escalation, and executing system commands. This function greatly simplifies the vulnerability exploitation process.

本实施例通过向渗透目标发送渗透指令来指示执行渗透操作,在将渗透指令发送至渗透目标的目标服务器之前,需要经过渗透目标的网关和防护系统,包括WAF,IDS(Intrusion Detection System,入侵检测系统),IPS(Intrusion Prevention System,入侵防御系统),监控设备,路由器,交换机。在底层的发包程序中添加绕过WAF的各种手段,并根据目标情况自动选择过WAF的方法,包括:1.采用在数据包头部填充大量无用数据绕过资源限制检测类型WAF;2.采用编码、变形、同类型函数替换、注释符处理、分词、数据库语法特性绕过规则检测类型WAF;3.采用协议转换、协议格式变化、更换协议绕过协议层面检测类型WAF;4.采用自主发现的数据包分片传输技术绕过WAF。分片传输是把待发送的数据每三个字节分割成多个数据包,单独发送到目标服务器上,从而躲避根据数据包内容匹配的检测手段,并且在发送HTTP数据包的底层程序中嵌入本实施例的分片技术。This embodiment instructs the execution of the penetration operation by sending a penetration instruction to the penetration target. Before sending the penetration instruction to the target server of the penetration target, it needs to pass through the gateway and protection system of the penetration target, including WAF, IDS (Intrusion Detection System), IPS (Intrusion Prevention System), monitoring equipment, routers, and switches. Various means of bypassing WAF are added to the underlying packet sending program, and the method of automatically selecting the WAF according to the target situation includes: 1. Filling a large amount of useless data in the packet header to bypass the resource restriction detection type WAF; 2. Using encoding, deformation, same type function replacement, annotation symbol processing, word segmentation, database syntax characteristics to bypass the rule detection type WAF; 3. Using protocol conversion, protocol format change, and protocol replacement to bypass the protocol level detection type WAF; 4. Using the self-discovered data packet fragmentation transmission technology to bypass WAF. Fragmentation transmission is to divide the data to be sent into multiple data packets every three bytes, and send them separately to the target server, so as to avoid the detection means based on the matching of the data packet content, and embed the fragmentation technology of this embodiment in the underlying program for sending HTTP data packets.

在本实施例中,在本实施例的一个实施方式中,还包括:将对外漏洞确定为局域网的危险入口,操作权限确定为网络系统的非法权限,生成渗透目标的渗透测试报告。In this embodiment, in an implementation of this embodiment, it also includes: determining the external vulnerability as a dangerous entrance to the local area network, determining the operation authority as an illegal authority of the network system, and generating a penetration test report of the penetration target.

本实施例可以根据渗透目标的运行环境定制化的指定检测方案。例如,检测最新爆发的某个漏洞的场景、检测邮件弱口令的场景、检测工控漏洞的场景等。支持场景化检测,可以根据需求快速定制至少包含常规测试、攻防演练、靶场演练、安全能力评估等场景,从而达到定制化场景漏洞发现的需求。单次渗透任务不限制添加目标数量,任务能够分布式的并发执行,从而保证高效率的发现漏洞。This embodiment can customize the specified detection scheme according to the operating environment of the penetration target. For example, the scenario of detecting a newly-exploited vulnerability, the scenario of detecting weak email passwords, the scenario of detecting industrial control vulnerabilities, etc. Supporting scenario-based detection, it can quickly customize at least routine testing, attack and defense drills, range drills, security capability assessments and other scenarios according to needs, so as to meet the needs of customized scenario vulnerability discovery. A single penetration task does not limit the number of targets added, and the task can be executed concurrently in a distributed manner, thereby ensuring efficient vulnerability discovery.

图4是本发明实施例任务节点针对渗透目标的攻击线路图,示意了从信息收集到后渗透攻击的流程走向,每个任务节点都可以执行渗透测试。在本实施例中,各个功能的实现可以通过设置在渗透设备内的功能模块来实现,包括:Figure 4 is an attack route diagram of a task node against a penetration target in an embodiment of the present invention, illustrating the process from information collection to post-penetration attack, and each task node can perform a penetration test. In this embodiment, the implementation of each function can be achieved by a functional module set in the penetration device, including:

信息收集模块:在渗透测试之前,使用各种线上手段来收集渗透目标的相关信息。信息收集模块主要是完成对渗透目标的信息收集。Information collection module: Before the penetration test, various online means are used to collect relevant information about the penetration target. The information collection module is mainly used to complete the information collection of the penetration target.

漏洞探测模块:该模块能够对渗透目标进行自动化的漏洞探测。漏洞探测分为两种方式,网站URL探测方式和IP地址探测方式。网站URL探测方式是通过对目标进行指纹识别,收集中间件、通用网站框架、开发语言、操作系统等指纹信息,从插件库中寻找与之相关的漏洞插件发现存在的漏洞。IP地址探测方式是对目标进行端口扫描,发现对外开放的服务,识别对应的服务类型,寻找与之相关的漏洞插件,从而判断漏洞是否存在。Vulnerability detection module: This module can automatically detect vulnerabilities in the penetration target. Vulnerability detection is divided into two methods, website URL detection method and IP address detection method. The website URL detection method is to fingerprint the target, collect fingerprint information such as middleware, general website framework, development language, operating system, etc., and find related vulnerability plug-ins from the plug-in library to find existing vulnerabilities. The IP address detection method is to perform port scanning on the target, find open services, identify the corresponding service type, and find related vulnerability plug-ins to determine whether a vulnerability exists.

漏洞插件库多个漏洞插件,漏洞范围覆盖web、中间件、数据库、网络设备、操作系统、智能设备、移动终端、工控设备等系统。能够发现不限于SQL(结构化查询语言)注入、XXE(Xml外部实体注入)、XSS(跨站脚本攻击)、任意文件上传、任意文件下载、任意文件操作、信息泄露、弱口令、本地文件包含、目录遍历、命令执行、错误配置等类型的漏洞。部分插件还提供了一键漏洞利用的高级功能。高级功能包括:执行命令、执行SQL、上传文件、反弹Shell、上传GTwebshell、下载文件等。漏洞插件库由360拥有多年渗透经验人员进行维护。Vulnerability plug-in library has multiple vulnerability plug-ins, and the scope of vulnerabilities covers web, middleware, database, network equipment, operating system, smart device, mobile terminal, industrial control equipment and other systems. It can find vulnerabilities of types such as but not limited to SQL (Structured Query Language) injection, XXE (Xml external entity injection), XSS (cross-site scripting attack), arbitrary file upload, arbitrary file download, arbitrary file operation, information leakage, weak password, local file inclusion, directory traversal, command execution, and misconfiguration. Some plug-ins also provide advanced functions for one-click vulnerability exploitation. Advanced functions include: executing commands, executing SQL, uploading files, rebounding Shell, uploading GTwebshell, downloading files, etc. The vulnerability plug-in library is maintained by 360 personnel with many years of penetration experience.

web指纹库可识别多种CMS(内容管理系统),总规则数量达到多个。系统服务指纹集成NMAP工具指纹库,能够满足常规系统服务的类型和版本识别。支持场景化检测,可以根据需求快速定制至少包含常规测试、攻防演练、靶场演练、安全能力评估等场景,从而达到定制化场景漏洞发现的需求。单次任务不限制添加目标数量,任务能够分布式的并发执行,从而保证高效率的发现漏洞。The web fingerprint library can identify a variety of CMS (content management systems), with a total number of rules reaching multiple. The system service fingerprint integrates the NMAP tool fingerprint library, which can meet the type and version identification of conventional system services. It supports scenario-based detection, and can quickly customize scenarios including at least conventional testing, attack and defense drills, range drills, security capability assessments, etc. according to needs, so as to meet the needs of customized scenario vulnerability discovery. There is no limit on the number of targets added in a single task, and tasks can be executed concurrently in a distributed manner, thereby ensuring efficient vulnerability discovery.

漏洞利用模块:漏洞利用模块用于解决两个问题:一是针对一些无法完全自动化发现的漏洞提供单独漏洞利用功能;例如,在一些无法通过爬虫或者其他手段自动获取到目标地址时,渗透人员利用此模块只需要手动填写相应的参数即可一键利用漏洞。二是可直接探测指定的漏洞是否存在并进一步利用此漏洞。此功能可以把复杂的漏洞利用过程简单化,比如输入oracle账号密码,一键提权、执行系统命令等。另外,此模块也提供漏洞利用的高级功能,包括执行命令、执行SQL、上传文件、反弹Shell、上传GTwebshell、下载文件等,均可以利用该模块进行漏洞利用。Vulnerability Exploitation Module: The vulnerability exploitation module is used to solve two problems: First, it provides a separate vulnerability exploitation function for some vulnerabilities that cannot be fully automatically discovered; for example, when the target address cannot be automatically obtained through crawlers or other means, the infiltration personnel only need to manually fill in the corresponding parameters to exploit the vulnerability with one click using this module. Second, it can directly detect whether the specified vulnerability exists and further exploit this vulnerability. This function can simplify the complex vulnerability exploitation process, such as entering the oracle account password, one-click privilege escalation, and executing system commands. In addition, this module also provides advanced vulnerability exploitation functions, including executing commands, executing SQL, uploading files, rebounding Shell, uploading GTwebshell, downloading files, etc., all of which can be used to exploit vulnerabilities.

后渗透模块:通过后渗透模块对目标进行横向渗透。例如:发现内网的网络拓扑情况、发现内网数据库漏洞、发现邮件服务器所在的位置,甚至获取办公网段、运维主机或者域控制器的权限。后渗透模块包含远程控制系统,可以对windows、linux、unix、android、ios、aix、bsd、cisco、osx等16种平台进行控制,支持X86、X64、arm、sparc、ppc等30多种框架。对于被控端,支持多种格式被控端的生成,包括可执行文件格式。例如exe、elf、powershell、vbs、dll等20多种,以及原始Shellcode的生成。通过其他漏洞打下的外网脆弱点连接后渗透模块,利用后渗透插件,即可实现主机信息收集、主机提权、内网网络拓扑发现、主机取证、密码获取、系统截图、键盘记录等功能。Post-penetration module: Use the post-penetration module to penetrate the target horizontally. For example: discover the network topology of the intranet, discover the vulnerability of the intranet database, discover the location of the mail server, and even obtain the permissions of the office network segment, operation and maintenance host or domain controller. The post-penetration module includes a remote control system that can control 16 platforms such as windows, linux, unix, android, ios, aix, bsd, cisco, osx, etc., and supports more than 30 frameworks such as X86, X64, arm, sparc, ppc, etc. For the controlled end, it supports the generation of controlled ends in multiple formats, including executable file formats. For example, more than 20 formats such as exe, elf, powershell, vbs, dll, and the generation of original shellcode. Connect the post-penetration module through the external network vulnerability points opened by other vulnerabilities, and use the post-penetration plug-in to realize host information collection, host privilege escalation, intranet network topology discovery, host forensics, password acquisition, system screenshots, keyboard recording and other functions.

插件管理模块:根据相关文档快速的编写插件,工具还提供代码自动生成功能方便插件的编写。插件库管理支持随时提交、导入新插件,利用动态导入加载技术,实现无延迟载入新插件。为了保证插件的有效性和准确性,提供了插件的启用、禁用操作功能方便随时配置插件库规则。为了更好的维护插件库增添了插件的审核机制,保证插件库里面的插件都是优质的插件。具备完善的插件库管理功能,可以提交插件、查看插件列表、审查插件。Plugin management module: quickly write plugins according to relevant documents. The tool also provides automatic code generation function to facilitate plugin writing. Plugin library management supports submitting and importing new plugins at any time, and uses dynamic import loading technology to load new plugins without delay. In order to ensure the effectiveness and accuracy of the plugin, the plugin enable and disable operation functions are provided to facilitate the configuration of plugin library rules at any time. In order to better maintain the plugin library, a plugin review mechanism is added to ensure that the plugins in the plugin library are high-quality plugins. It has a complete plugin library management function, which can submit plugins, view plugin lists, and review plugins.

指纹管理模块:指纹管理主要为了维护指纹库而设计,可以在该页面查看所有的指纹库中的规则信息。指纹管理模块提供提交指纹功能,方便渗透人员随时添加指纹信息。利用动态导入技术,可以实现无延迟载入新指纹到指纹库中。添加指纹规则支持web通用框架、中间件、开发语言、第三方框架等。识别手段支持字符串、MD5、数据包头、特殊页面状态码等方式。为了更好的维护指纹库,增添了指纹的审核机制,保证指纹库里面的插件都是优质的指纹规则。指纹管理包含提交指纹、指纹列表、审查指纹功能。Fingerprint management module: Fingerprint management is mainly designed for maintaining the fingerprint library. You can view all the rule information in the fingerprint library on this page. The fingerprint management module provides a fingerprint submission function, which is convenient for penetration personnel to add fingerprint information at any time. Using dynamic import technology, new fingerprints can be loaded into the fingerprint library without delay. Adding fingerprint rules supports common web frameworks, middleware, development languages, third-party frameworks, etc. Identification methods support strings, MD5, data packet headers, special page status codes, etc. In order to better maintain the fingerprint library, a fingerprint review mechanism has been added to ensure that the plug-ins in the fingerprint library are all high-quality fingerprint rules. Fingerprint management includes the functions of submitting fingerprints, fingerprint lists, and reviewing fingerprints.

WAF绕过技术模块:很多WAF(网站应用级入侵防御系统,web ApplicationFirewall)防护设备被部署在网络节点中,本模块用于绕过防护设备。WAF bypass technology module: Many WAF (web application-level intrusion prevention system, web Application Firewall) protection devices are deployed in network nodes. This module is used to bypass the protection devices.

通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above implementation methods, those skilled in the art can clearly understand that the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course can also be implemented by hardware, but in many cases the former is a better implementation method. Based on such an understanding, the technical solution of the present invention, or the part that contributes to the prior art, can be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), and includes a number of instructions for a terminal device (which can be a mobile phone, computer, server, or network device, etc.) to execute the methods described in each embodiment of the present invention.

实施例2Example 2

在本实施例中还提供了一种基于web指纹信息的漏洞探测装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In this embodiment, a vulnerability detection device based on web fingerprint information is also provided, which is used to implement the above embodiments and preferred implementation modes, and the descriptions that have been made will not be repeated. As used below, the term "module" can be a combination of software and/or hardware that implements a predetermined function. Although the device described in the following embodiments is preferably implemented in software, the implementation of hardware, or a combination of software and hardware, is also possible and conceivable.

图5是根据本发明实施例的基于web指纹信息的漏洞探测装置的结构框图,可以应用在服务器中,如图5所示,该装置包括:确定模块50,采集模块52,探测模块54,其中,FIG5 is a structural block diagram of a vulnerability detection device based on web fingerprint information according to an embodiment of the present invention, which can be applied in a server. As shown in FIG5 , the device includes: a determination module 50, a collection module 52, and a detection module 54, wherein:

确定模块50,用于确定渗透目标的web网站,其中,所述渗透目标为通过网络连接的网络系统;A determination module 50, for determining a website of a penetration target, wherein the penetration target is a network system connected via a network;

采集模块52,用于采集所述web网站的web指纹信息;A collection module 52, used to collect web fingerprint information of the web site;

探测模块54,用于使用所述web指纹信息探测所述渗透目标的对外漏洞。The detection module 54 is used to detect external vulnerabilities of the penetration target using the web fingerprint information.

可选的,所述采集模块包括:采集单元,用于采集所述web网站的以下构架信息至少之一:开发语言、部署服务器的操作系统、中间件、使用的第三方代码通用框架、内容管理系统CMS、内容分发网络CDN。Optionally, the acquisition module includes: a collection unit, used to collect at least one of the following architecture information of the web site: development language, operating system of the deployment server, middleware, third-party code general framework used, content management system CMS, content distribution network CDN.

可选的,所述采集模块包括:发送单元,用于向所述web网站的网站服务器发送超文本传输协议HTTP请求;接收单元,用于接收所述web网站基于所述HTTP请求反馈的网页信息;检测单元,用于根据所述网页信息检测所述web指纹信息。Optionally, the acquisition module includes: a sending unit, used to send a Hypertext Transfer Protocol HTTP request to the website server of the web website; a receiving unit, used to receive web page information fed back by the web website based on the HTTP request; and a detection unit, used to detect the web fingerprint information based on the web page information.

可选的,所述检测单元包括:第一查找子单元,用于查找所述网页信息中的状态码;判断子单元,用于根据所述状态码判断所述web网站是否存在指定页面;第一确定子单元,用于根据所述指定页面确定所述web指纹信息。Optionally, the detection unit includes: a first search subunit, used to search for a status code in the web page information; a judgment subunit, used to judge whether a specified page exists on the web site based on the status code; and a first determination subunit, used to determine the web fingerprint information based on the specified page.

可选的,所述检测单元包括:识别子单元,用于识别所述网页信息中指定文件的HASH值;第二确定子单元,用于根据所述HASH值确定所述web指纹信息。Optionally, the detection unit includes: an identification subunit, used to identify the HASH value of a specified file in the web page information; and a second determination subunit, used to determine the web fingerprint information according to the HASH value.

可选的,所述检测单元包括:第二查找子单元,用于在网页源码的数据包正文中查找指定关键字,和/或,在网页源码的数据包包头中查找指定字符串,和/或,在网页源码的数据包包头中查找规则字符串,其中,所述网页信息包括所述网页源码,所述规则字符串是采用正则表达式设置的字符串组合;第三确定子单元,用于根据以下至少之一确定所述web指纹信息:所述指定关键字、所述指定字符串、规则字符串。Optionally, the detection unit includes: a second search subunit, used to search for specified keywords in the data packet body of the web page source code, and/or, search for specified strings in the data packet header of the web page source code, and/or, search for regular strings in the data packet header of the web page source code, wherein the web page information includes the web page source code, and the regular string is a string combination set using a regular expression; a third determination subunit, used to determine the web fingerprint information based on at least one of the following: the specified keyword, the specified string, and the regular string.

可选的,所述装置还包括:获取模块,用于在所述探测模块使用所述web指纹信息探测所述渗透目标的对外漏洞之后,利用所述对外漏洞获取所述渗透目标的操作权限;渗透模块,用于使用所述操作权限对所述网络系统执行渗透操作。Optionally, the device also includes: an acquisition module, which is used to obtain the operation authority of the penetration target by using the external vulnerability after the detection module uses the web fingerprint information to detect the external vulnerability of the penetration target; and a penetration module, which is used to use the operation authority to perform penetration operations on the network system.

需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述各个模块以任意组合的形式分别位于不同的处理器中。It should be noted that the above modules can be implemented by software or hardware. For the latter, it can be implemented in the following ways, but not limited to: the above modules are all located in the same processor; or the above modules are located in different processors in any combination.

实施例3Example 3

本发明的实施例还提供了一种存储介质,该存储介质中存储有计算机程序,其中,该计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。An embodiment of the present invention further provides a storage medium, in which a computer program is stored, wherein the computer program is configured to execute the steps of any of the above method embodiments when running.

可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的计算机程序:Optionally, in this embodiment, the storage medium may be configured to store a computer program for performing the following steps:

S1,确定渗透目标的web网站,其中,所述渗透目标为通过网络连接的网络系统;S1, determining a website of a penetration target, wherein the penetration target is a network system connected via a network;

S2,采集所述web网站的web指纹信息;S2, collecting web fingerprint information of the web site;

S3,使用所述web指纹信息探测所述渗透目标的对外漏洞。S3, using the web fingerprint information to detect external vulnerabilities of the penetration target.

可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(Read-Only Memory,简称为ROM)、随机存取存储器(Random Access Memory,简称为RAM)、移动硬盘、磁碟或者光盘等各种可以存储计算机程序的介质。Optionally, in this embodiment, the above-mentioned storage medium may include but is not limited to: a USB flash drive, a read-only memory (ROM), a random access memory (RAM), a mobile hard disk, a magnetic disk or an optical disk, and other media that can store computer programs.

本发明的实施例还提供了一种电子装置,包括存储器和处理器,该存储器中存储有计算机程序,该处理器被设置为运行计算机程序以执行上述任一项方法实施例中的步骤。An embodiment of the present invention further provides an electronic device, including a memory and a processor, wherein a computer program is stored in the memory, and the processor is configured to run the computer program to execute the steps in any one of the above method embodiments.

可选地,上述电子装置还可以包括传输设备以及输入输出设备,其中,该传输设备和上述处理器连接,该输入输出设备和上述处理器连接。Optionally, the electronic device may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.

可选地,在本实施例中,上述处理器可以被设置为通过计算机程序执行以下步骤:Optionally, in this embodiment, the processor may be configured to perform the following steps through a computer program:

S1,确定渗透目标的web网站,其中,所述渗透目标为通过网络连接的网络系统;S1, determining a website of a penetration target, wherein the penetration target is a network system connected via a network;

S2,采集所述web网站的web指纹信息;S2, collecting web fingerprint information of the web site;

S3,使用所述web指纹信息探测所述渗透目标的对外漏洞。S3, using the web fingerprint information to detect external vulnerabilities of the penetration target.

可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation modes, and this embodiment will not be described in detail here.

上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the above-mentioned embodiments of the present application are for description only and do not represent the advantages or disadvantages of the embodiments.

在本申请的上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments of the present application, the description of each embodiment has its own emphasis. For parts that are not described in detail in a certain embodiment, please refer to the relevant descriptions of other embodiments.

在本申请所提供的几个实施例中,应该理解到,所揭露的技术内容,可通过其它的方式实现。其中,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元或模块的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed technical content can be implemented in other ways. Among them, the device embodiments described above are only schematic. For example, the division of the units is only a logical function division. There may be other division methods in actual implementation. For example, multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of units or modules, which can be electrical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.

另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above-mentioned integrated unit may be implemented in the form of hardware or in the form of software functional units.

所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or the part that contributes to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including a number of instructions to enable a computer device (which can be a personal computer, server or network device, etc.) to perform all or part of the steps of the method described in each embodiment of the present application. The aforementioned storage medium includes: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, disk or optical disk and other media that can store program code.

以上所述仅是本申请的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本申请原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本申请的保护范围。The above is only a preferred implementation of the present application. It should be pointed out that for ordinary technicians in this technical field, several improvements and modifications can be made without departing from the principles of the present application. These improvements and modifications should also be regarded as the scope of protection of the present application.

Claims (10)

1. A vulnerability detection method based on web fingerprint information is characterized by comprising the following steps:
determining a web site of a penetration target, wherein the penetration target is a network system connected through a network;
Collecting web fingerprint information of the web site;
detecting an external vulnerability of the penetration target by using the web fingerprint information;
Acquiring the operation authority of the penetration target by using the external leak;
Performing a permeation operation on the network system using the operation authority, wherein the permeation operation comprises at least one of: and accessing the business system of the penetration target, accessing the local data of the penetration target, and performing transverse penetration on the intranet of the penetration target.
2. The method of claim 1, wherein gathering web fingerprint information for the web site comprises:
Gathering at least one of the following framework information of the web site: development language, operating system of deployment server, middleware, third party code general framework used, content management system CMS, content delivery network CDN.
3. The method of claim 1, wherein gathering web fingerprint information for the web site comprises:
sending a hypertext transfer protocol (HTTP) request to a website server of the web website;
receiving webpage information fed back by the web site based on the HTTP request;
And detecting the web fingerprint information according to the web page information.
4. The method of claim 3, wherein detecting the web fingerprint information from the web page information comprises:
searching a status code in the webpage information;
Judging whether a specified page exists in the web site according to the status code;
and determining the web fingerprint information according to the designated page.
5. The method of claim 3, wherein detecting the web fingerprint information from the web page information comprises:
Identifying a HASH value of the designated file in the web page information;
and determining the web fingerprint information according to the HASH value.
6. The method of claim 3, wherein detecting the web fingerprint information from the web page information comprises:
Searching a specified keyword in a data packet text of a webpage source code, and/or searching a specified character string in a data packet header of the webpage source code, and/or searching a regular character string in the data packet header of the webpage source code, wherein the webpage information comprises the webpage source code, and the regular character string is a character string combination set by adopting a regular expression;
Determining the web fingerprint information according to at least one of: the specified keywords, the specified character strings and the regular character strings.
7. The method of claim 1, wherein detecting an external vulnerability of the infiltrated target using the web fingerprint information comprises:
selecting a detection plugin matched with the web fingerprint information from a preset plugin library;
and calling the detection plug-in to identify an external service port provided by the penetration target.
8. A vulnerability detection device based on web fingerprint information, comprising:
The system comprises a determining module, a processing module and a processing module, wherein the determining module is used for determining a web site of a penetration target, and the penetration target is a network system connected through a network;
the acquisition module is used for acquiring web fingerprint information of the web website;
the detection module is used for detecting external loopholes of the penetration targets by using the web fingerprint information;
The acquisition module is used for acquiring the operation authority of the penetration target by utilizing the external vulnerability;
And a penetration module for performing a penetration operation on the network system using the operation authority, wherein the penetration operation comprises at least one of the following: and accessing the business system of the penetration target, accessing the local data of the penetration target, and performing transverse penetration on the intranet of the penetration target.
9. A storage medium having a computer program stored therein, wherein the computer program is arranged to perform the method of any of claims 1 to 7 when run.
10. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to run the computer program to perform the method of any of claims 1 to 7.
CN201910747265.0A 2019-08-14 2019-08-14 Vulnerability detection method and device based on web fingerprint information Active CN110879891B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910747265.0A CN110879891B (en) 2019-08-14 2019-08-14 Vulnerability detection method and device based on web fingerprint information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910747265.0A CN110879891B (en) 2019-08-14 2019-08-14 Vulnerability detection method and device based on web fingerprint information

Publications (2)

Publication Number Publication Date
CN110879891A CN110879891A (en) 2020-03-13
CN110879891B true CN110879891B (en) 2024-08-23

Family

ID=69727412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910747265.0A Active CN110879891B (en) 2019-08-14 2019-08-14 Vulnerability detection method and device based on web fingerprint information

Country Status (1)

Country Link
CN (1) CN110879891B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111597490A (en) * 2020-05-21 2020-08-28 深圳前海微众银行股份有限公司 Web fingerprint identification method, device, device and computer storage medium
CN111737702A (en) * 2020-06-22 2020-10-02 四川长虹电器股份有限公司 Web fingerprint identification method based on Chebyshev inequality
CN111898133A (en) * 2020-07-23 2020-11-06 昆山领创信息科技有限公司 Penetration testing device and method based on automation
CN112087455B (en) * 2020-09-10 2022-10-21 杭州安恒信息技术股份有限公司 A method, system, device and medium for generating WAF site protection rules
CN112468360A (en) * 2020-11-13 2021-03-09 北京安信天行科技有限公司 Asset discovery identification and detection method and system based on fingerprint
CN115412311A (en) * 2022-08-12 2022-11-29 天翼安全科技有限公司 Method, device and storage medium for vulnerability detection
CN115941280B (en) * 2022-11-10 2024-01-26 北京源堡科技有限公司 Penetration method, device, equipment and medium based on web fingerprint information
CN115987647A (en) * 2022-12-26 2023-04-18 安天科技集团股份有限公司 A web vulnerability detection method, device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103065095A (en) * 2013-01-29 2013-04-24 四川大学 WEB vulnerability scanning method and vulnerability scanner based on fingerprint recognition technology
CN103297394A (en) * 2012-02-24 2013-09-11 阿里巴巴集团控股有限公司 Website security detection method and device
CN103324886A (en) * 2013-06-05 2013-09-25 中国科学院计算技术研究所 Method and system for extracting fingerprint database in network intrusion detection
CN108063759A (en) * 2017-12-05 2018-05-22 西安交大捷普网络科技有限公司 Web vulnerability scanning methods
CN109190380A (en) * 2018-08-20 2019-01-11 杭州安恒信息技术股份有限公司 The method and system that batch website loophole quickly detects are realized based on web fingerprint

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297394A (en) * 2012-02-24 2013-09-11 阿里巴巴集团控股有限公司 Website security detection method and device
CN103065095A (en) * 2013-01-29 2013-04-24 四川大学 WEB vulnerability scanning method and vulnerability scanner based on fingerprint recognition technology
CN103324886A (en) * 2013-06-05 2013-09-25 中国科学院计算技术研究所 Method and system for extracting fingerprint database in network intrusion detection
CN108063759A (en) * 2017-12-05 2018-05-22 西安交大捷普网络科技有限公司 Web vulnerability scanning methods
CN109190380A (en) * 2018-08-20 2019-01-11 杭州安恒信息技术股份有限公司 The method and system that batch website loophole quickly detects are realized based on web fingerprint

Also Published As

Publication number Publication date
CN110879891A (en) 2020-03-13

Similar Documents

Publication Publication Date Title
CN110879891B (en) Vulnerability detection method and device based on web fingerprint information
CN110677381B (en) Penetration testing method and device, storage medium, electronic device
Zhang et al. Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers
CN110209583B (en) Security testing methods, devices, systems, equipment and storage media
CN112383546B (en) Method for processing network attack behavior, related equipment and storage medium
CN110881024B (en) Vulnerability detection method and device, storage medium and electronic device
CN103607385B (en) Method and apparatus for security detection based on browser
CN106302337B (en) Vulnerability detection method and device
CN110768951B (en) Method and device for verifying system vulnerability, storage medium, and electronic device
Nappa et al. Cyberprobe: Towards internet-scale active detection of malicious servers
RU2634209C1 (en) System and method of autogeneration of decision rules for intrusion detection systems with feedback
US20120255022A1 (en) Systems and methods for determining vulnerability to session stealing
CN110768949B (en) Vulnerability detection method and device, storage medium and electronic device
Li et al. Towards fine-grained fingerprinting of firmware in online embedded devices
CN110880983A (en) Penetration testing method and device based on scene, storage medium and electronic device
CN110768948A (en) Vulnerability detection method and device, storage medium and electronic device
Serketzis et al. Actionable threat intelligence for digital forensics readiness
CN110765333A (en) Method and device for collecting website information, storage medium and electronic device
CN110768950A (en) Method and device for sending penetration instruction, storage medium, and electronic device
CN104954345B (en) Attack recognition method and device based on object analysis
CN114666104A (en) Penetration testing method, system, computer equipment and storage medium
CN110768947B (en) Penetration test password sending method and device, storage medium and electronic device
CN108737332A (en) A kind of man-in-the-middle attack prediction technique based on machine learning
Ashraf Avoiding vulnerabilities and attacks with a proactive strategy for web applications
CN108259416B (en) Method for detecting malicious webpage and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 100032 NO.332, 3rd floor, Building 102, 28 xinjiekouwai street, Xicheng District, Beijing

Applicant after: QAX Technology Group Inc.

Applicant after: Qianxin Wangshen information technology (Beijing) Co.,Ltd.

Address before: 100032 NO.332, 3rd floor, Building 102, 28 xinjiekouwai street, Xicheng District, Beijing

Applicant before: QAX Technology Group Inc.

Country or region before: China

Applicant before: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant