Web vulnerability scanning method and device based on infiltration technology

A vulnerability scanner and vulnerability scanning technology, applied in the field of computer networks, can solve problems such as performance discounts

Active Publication Date: 2011-06-22
WUXI TONGWEI TECH
View PDF4 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Finally, this traditional web security scanning product has a C / S structure. In actual operation, its performance will be greatly reduced due to different PCs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web vulnerability scanning method and device based on infiltration technology
  • Web vulnerability scanning method and device based on infiltration technology
  • Web vulnerability scanning method and device based on infiltration technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with drawings and embodiments. The invention aims to provide a tool for scanning website security loopholes. Automatically and efficiently check the loopholes and security risks existing in web applications, and evaluate the system security.

[0029] The present invention mainly improves the loophole scanning method of the traditional web server, and the method is as follows: adopt a loophole scanner, and the loophole scanner structure includes four parts: client, browser, scanning host and web server, such as figure 1 As shown, the scanning host part includes a control platform, a scanning mode setting module, a scanning module and a vulnerability database. The user sets the scanning mode in the scanning mode setting module through the control platform, and the single-level scanning in the scanning module The depth and breadth are expanded to two times or more, and finally the target website is scann...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a web vulnerability scanning method and device based on an infiltration technology. The scanning device comprises a client, a Web browser, a scanning host and a Web server which are sequentially connected and is characterized in that the scanning host comprises a control platform, a scanning mode setting module, a scanning module and a vulnerability library, a scanning modeis set in the scanning mode setting module by a user through the control platform, a scanning depth is extended from a first-class scanning to a second-class scanning or even a deeper scanning in thescanning module, and finally, a target website is scanned by using the vulnerability library and a test report is given. By virtue of the complete crawling-based website security vulnerability scanning method, improvements on a further treatment (strengthening the depth of detection) after vulnerabilities are detected and the flexibility of a detection mode are realized, and a comprehensive and effective solution is provided for system/network vulnerability scanning and processing.

Description

technical field [0001] The invention relates to a web vulnerability scanning method and a vulnerability scanner based on penetration technology, belonging to the technical field of computer networks. Background technique [0002] With the development of the Internet, the security problems faced by programs run by web servers are becoming more and more prominent. Ensuring the safe and stable operation of web servers is an important task for IT departments in many companies and institutions. Usually, due to the lack of effective web security assessment tools and the subsequent security problems caused by frequent system upgrades, managers cannot find problems in a timely and effective manner. Practice has shown that security problems based on the network layer often reflect obvious problems and are easy to be found. But another type of problem is caused by the application layer, which is difficult to find in time. This type of problem is more often due to the lack of consid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 袁宝弟王永忠施林林陈相云
Owner WUXI TONGWEI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products