Vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in the Internet field, can solve the problem that the vulnerability detection method cannot scan the vulnerability, and achieve the effect of ensuring breadth and depth

Inactive Publication Date: 2016-03-23
BEIJING QIHOO TECH CO LTD +1
View PDF7 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the present invention proposes a vulnerability detection method and device, the main purpose of which is to solve the problem that the vulnerability detection method in the prior art cannot comprehensively perform vulnerability scanning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0021] At present, when detecting vulnerabilities, in order to scan multi-level domain names to ensure the depth of scanning, vulnerability scanning is usually performed through a passive scanning engine, that is, passively scans for vulnerabilities on domain names accessed by users. Although this method can guarantee vulnerability scanning for domain names at a deeper level, it cannot complete vulnerability scanning for domain name...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability detection method and device, relates to the technical field of Internet, and solves the problem that vulnerability scanning cannot be performed completely by a vulnerability detection method in the prior art. The method comprises the following steps: acquiring a link address clicked by a user to serve as a torrent link address, and downloading a corresponding torrent webpage according to the torrent link address; capturing sub-link addresses included in the torrent webpage, and downloading corresponding sub-webpages according to the sub-link addresses; performing vulnerability detection scanning on the torrent webpage and the sub-webpages; and determining whether vulnerabilities exist in the webpages or not according to a scanning result. The vulnerability detection method is mainly applied to breadth and depth detection of the vulnerabilities in order to achieve the effect of comprehensively detecting the vulnerabilities.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a loophole detection method and device. Background technique [0002] In the existing processing methods for scanning vulnerabilities, in order to scan multi-level domain names to ensure the depth of scanning, vulnerability scanning is usually performed through a passive scanning engine, that is, passively scans the domain names accessed by users for vulnerabilities. scanning. Although this method can guarantee the vulnerability scanning of domain names at a deeper level and achieve the effect of in-depth scanning of vulnerabilities, it cannot complete vulnerability scanning for domain names that users do not access, resulting in insufficient breadth of vulnerability scanning, that is, the coverage of vulnerability scanning If the requirements are not met, a comprehensive vulnerability scan cannot be performed. Contents of the invention [0003] In view of this, the pres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/14H04L63/1433H04L61/4511
Inventor 王泽
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products