Method and device for building vulnerability verification environment
A technology for verifying environment and vulnerabilities, applied in the field of information security, can solve the problems of high testers' ability requirements and labor-intensive problems, and achieve the effect of improving construction efficiency, reducing labor consumption, and reducing ability requirements.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0018] For example, see figure 1 , is a schematic flowchart of a method for building a vulnerability verification environment provided by an embodiment of the present invention. Such as figure 1 As shown, the method may include:
[0019] S110. Provide an element library, so that the user can select a required element from the element library, wherein the element library includes elements of the file used for vulnerability verification.
[0020] It should be noted that the element database described in the embodiment of the present invention can be constructed by using any database language or database software, which is not limited in the present invention. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


