Vulnerability scanning method and device

A vulnerability scanning and vulnerability scanner technology, applied in the field of network security, can solve the problem of not being able to detect the security of the network environment, and achieve the effect of realizing security detection and increasing analysis.

Active Publication Date: 2017-12-26
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the entire network environment includes not only the server, but also the client connected to the server, and the existing technology only remotely detects the security issues of the server, it cannot detect the security of the entire network environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and device
  • Vulnerability scanning method and device
  • Vulnerability scanning method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] figure 1 The flowchart of the vulnerability scanning method provided by the embodiment of the present invention; figure 2 The network topology diagram provided for the embodiment of the present invention. The specific steps of the vulnerability scanning method provided by the embodiment of the present invention are as follows:

[0030] Step S101, the reverse scanning proxy module obtains the client message;

[0031] The reverse scanning proxy module is installed on the server; the reverse scanning proxy module obtains the client message including: the reverse scanning proxy module obtains the information sent by the client during the interaction process between the client and the server. or the reverse scan proxy module sends a construction test message to the client, and obtains a response message from the client to the construction test message.

[0032] Such as figure 2 As shown, after obtaining the consent of the server management side, the reverse scanning pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a vulnerability scanning method and device. The method includes: a reverse scanning agent module obtains a client message; the reverse scanning agent module sends the client message to a vulnerability scanner, so that the vulnerability scanner identifies the The vulnerability of the client; or the reverse scanning proxy module identifies the vulnerability of the client according to the client message, and sends the vulnerability of the client to the vulnerability scanner; the reverse scanning proxy module receives the vulnerability control instructions of the scanner, and change the working mode and / or working mode according to the control instructions, and update the vulnerability rules. The embodiment of the present invention obtains the client message through the reverse scanning proxy module, and analyzes the client message to identify the loopholes in the client. Analysis, thus realizing the security detection of the entire network environment.

Description

technical field [0001] The embodiments of the present invention relate to the field of network security, and in particular, to a vulnerability scanning method and device. Background technique [0002] With the development of computer network technology, network security technology is also constantly developing. If there is a major loophole in the server, hackers will use this loophole to steal important information of the server or client, causing serious consequences. Therefore, the importance of network security is becoming increasingly prominent . [0003] The existing technology mainly uses the vulnerability scanner to remotely detect the vulnerabilities of the server to maintain network security. Specifically, the vulnerability scanner acts as a client to send a connection request message to the server, and the server responds to the connection request message and sends the response message to the vulnerability A scanner, the vulnerability scanner analyzes and judges w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433G06F21/554G06F21/577H04L63/0263H04L63/1416H04L63/0254H04L63/10H04L63/20
Inventor 李瀛
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products