Method and device for scanning vulnerability

A vulnerability scanning and vulnerability scanner technology, applied in the field of network security, can solve the problem of not being able to detect the security of the network environment, and achieve the effect of realizing security detection and increasing analysis.

Active Publication Date: 2015-04-08
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the entire network environment includes not only the server, but also the client connected to the server, and the existi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for scanning vulnerability
  • Method and device for scanning vulnerability
  • Method and device for scanning vulnerability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] figure 1 The flowchart of the vulnerability scanning method provided by the embodiment of the present invention; figure 2 The network topology diagram provided for the embodiment of the present invention. The specific steps of the vulnerability scanning method provided by the embodiment of the present invention are as follows:

[0030] Step S101, the reverse scanning proxy module obtains the client message;

[0031] The reverse scanning proxy module is installed on the server; the reverse scanning proxy module obtains the client message including: the reverse scanning proxy module obtains the information sent by the client during the interaction process between the client and the server. or the reverse scan proxy module sends a construction test message to the client, and obtains a response message from the client to the construction test message.

[0032] Such as figure 2 As shown, after obtaining the consent of the server management side, the reverse scanning pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and a device for scanning vulnerability. The method comprises the steps of obtaining a client side message by a reverse scanning agent module; sending the client side message to a vulnerability scanner by the reverse scanning agent module, and enabling the vulnerability scanner to identify vulnerabilities of a client side according to the client side message; or identifying the vulnerabilities of the client side by the reverse scanning agent module according to the client side message, and sending the vulnerabilities of the client side to the vulnerability scanner; receiving a control command of the vulnerability scanner by the reverse scanning agent module, changing a working way and/or a working mode according to the control command, and updating a vulnerability rule. According to the method and the device provided by the embodiment of the invention, the client side message is obtained through the reverse scanning agent module, the client side message is analyzed so as to identify the vulnerabilities existing in the client side, and analysis on a safety problem of the client side is added on the basis of the safety problem of a remote detection server, so the safety detection on the whole network environment is realized.

Description

technical field [0001] The embodiments of the present invention relate to the field of network security, and in particular, to a vulnerability scanning method and device. Background technique [0002] With the development of computer network technology, network security technology is also constantly developing. If there is a major loophole in the server, hackers will use this loophole to steal important information of the server or client, causing serious consequences. Therefore, the importance of network security is becoming increasingly prominent . [0003] The existing technology mainly uses the vulnerability scanner to remotely detect the vulnerabilities of the server to maintain network security. Specifically, the vulnerability scanner acts as a client to send a connection request message to the server, and the server responds to the connection request message and sends the response message to the vulnerability A scanner, the vulnerability scanner analyzes and judges w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1433G06F21/554G06F21/577H04L63/0263H04L63/1416H04L63/0254H04L63/10H04L63/20
Inventor 李瀛
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products