Vulnerability scanning method, device and electronic device

A vulnerability and vulnerability scanning technology, applied in the field of vulnerability scanning, can solve the problems of missed detection, failure to pass the vulnerability, and long time, so as to improve the efficiency of vulnerability scanning, avoid the missed detection of vulnerabilities, and improve the accuracy rate

Active Publication Date: 2016-04-20
ZHUHAI BAOQU TECH CO LTD
View PDF11 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in this vulnerability scanning method, when the vulnerability scanning is performed on the server, since the client cannot modify the request parameters in the vulnerability scanning request message, it is necessary to construct the vulnerability scanning request message in different clients, so as to use the information returned by the server according to the vulnerability scanning request message. Vulnerability scanning response message to determine if there are vulnerabilities in the server, whether the existing vulnerabilities are the same, which makes the time required for server vulnerability scanning longer and the efficiency of vulnerability scanning is low; at the same time, due to the vulnerability prevention mechanism preset by the client When the client constructs a vulnerability scanning req

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method, device and electronic device
  • Vulnerability scanning method, device and electronic device
  • Vulnerability scanning method, device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0062] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0063] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0064] figure 1 It is a schematic flowchart of a method for scanning vulnerabilities according to an embodiment of the present invention. see figure 1 , the method includes:

[0065] Step 11, intercepting each vulnerability scanning request message that the client will send to the server;

[0066] In this step, when performing server vulnerability scanning, relevant technicians or maintenance personnel can call the application functions of the client in turn, and input the payload in the content input area of ​​th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a vulnerability scanning method, device and an electronic device. The method comprises: capturing every vulnerability scanning request message to be sent to a server by a client; selecting the vulnerability scanning request message transmitted through a preset transmission protocol from the captured vulnerability scanning request messages; analyzing the message body in the selected vulnerability scanning request message, editing the request parameter value in the analyzed message body; packaging the edited message body into a vulnerability scanning request message to be sent, sending the vulnerability scanning request message to be sent to the server according to a preset time cycle, and receiving a vulnerability scanning response message returned from the server so as to determine whether the server has vulnerability. In application of the invention, the vulnerability scanning efficiency can be improved.

Description

technical field [0001] The invention relates to computer network security technology, in particular to a method, device and electronic equipment for scanning loopholes. Background technique [0002] With the rapid development of computer network technology, the Internet has gradually become an indispensable part of people's work and life. However, while the Internet brings convenience to people, due to the complexity of the Internet application environment and the diversity of Internet applications, people are vulnerable to cyber attacks such as computer viruses and Trojan horses in the process of using the Internet. Information leakage or large material losses. [0003] In order to improve the security of the Internet, a method of performing vulnerability scanning on the client, server and the Internet between the two is currently proposed. Since the client is easy to implement vulnerability scanning, the developer sets the vulnerability scanning detection code in Client,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/57
CPCG06F21/577H04L63/1408H04L63/1425
Inventor 王鑫
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products