渗透测试中漏洞利用自动化研究

董颖 - 2013 - ir.lzu.edu.cn
SQL injection and XSS vulnerabilities in penetration testing, and chooses a vogue open-source
Joomla, a content management system… , a relatively sound attack database which can be …

新型二阶SQL 注入技术研究

乐德广, 李鑫, 龚声蓉, 郑力新 - 通信学报, 2015 - infocomm-journal.com
SQL injection, second-order SQL injection attacks the operating system and client second-order
SQL injection. … Model-driven penetration test of the SQL injection in Web applications[J]. …

[PDF][PDF] 基于二阶分片重组盲注的渗透测试方法

乐德广, 龚声蓉, 吴少刚, 徐锋, 刘文生 - 通信学报, 2017 - infocomm-journal.com
… Abstract: How to get rid of the blindness of current SQL injection penetration test, produce
the optimized attack pattern of SQL injection, enhance the effectiveness in the phase of attack

[PDF][PDF] 基于异构冗余的拟态数据库模型设计与测试①

赵琳娜, 倪明, 喻卫东 - 2019 - csa.org.cn
… vulnerable to the most harmful SQL injection attacks. Traditional database defense methods
… is tested using the SQL injection module in the penetration test rehearsal system DVWA to …

Joomla 内容管理系统漏洞利用技术

董颖, 张玉清, 乐洪舟 - 中国科学院大学学报, 2015 - journal.ucas.ac.cn
… traversethemtoexploit vulnerabilitiesꎬ use attack patterns in database as seeds to generate
… 7 Detected SQL injection vulnerability and XSS vulnerability intersections of penetration test …

[HTML][HTML] 基于模型的Web 应用二阶SQL 注入测试用例集生成

尤枫, 王维扬, 尚颖 - 计算机系统应用, 2020 - csa.org.cn
… Abstract: SQL injection vulnerability has been the one of the … Among them, second-order
SQL injection vulnerabilities are … classification of SQL injection vulnerabilities and attacks on …

基于攻击图和深度Q 学习网络的自动化安全分析与渗透测试模型

樊成, 胡国庆, 丁涛杰, 张展华 - 网络与信息安全学报, 2023 - infocomm-journal.com
… , identifying and preserving all attack paths that lead to the … determine the optimal attack
path during penetration testing. … mentation of SQL injection attack using open source tools for …

[PDF][PDF] 自动化渗透测试技术研究综述

陈可, 鲁辉, 方滨兴, 孙彦斌, 苏申, 田志宏 - 软件学报, 2023 - jos.org.cn
… automated penetration is explored from the dimensions of attack-defense confrontation and
vulnerability combination utilization. Key words: automated penetration testing; attack graph; …

[PDF][PDF] 医疗行业Web 应用程序渗透测试实例研究

徐绍飞, 龚家瑜, 杨亚萍 - 计算机与数字工程, 2018 - jsj.journal.cssc709.net
… Referring to OWASP TOP 10,penetration testing based on web … this paper,the results of
penetration testing can make a reference … Key Words medical industry,penetration testing,system

[PDF][PDF] web 服务器拟态防御原理验证系统测试与分析

张铮, 马博林, 邬江兴 - Journal of Cyber Security 信息安全学报, 2017 - jcs.iie.ac.cn
… the network attacks, in order to achieve the requirement of controlling system security risk. …
办公 室发布的渗透测试模型[12] (A penetration test model), web 安全组织OWASP 发布的测试…