Vulnerability scanning method and device and computer readable medium

A vulnerability scanning and scanning technology, applied in the field of information processing, can solve problems such as low operation efficiency, different vulnerabilities, and a large number of manual operations

Active Publication Date: 2017-09-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF15 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are more or less differences between various programs and software, and the vulnerabilities are not the same.
Therefore, a lot of manual ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and device and computer readable medium
  • Vulnerability scanning method and device and computer readable medium
  • Vulnerability scanning method and device and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] In order to better understand the technical solutions of the present invention, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0100] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0101] Terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. As used in the embodiments of the present invention and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly indicates otherwise.

[0102] It should be understood that the term "an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a vulnerability scanning method and device and a computer readable medium and relates to information processing field for solving the problems that an existing universal mode is very low in scanning efficiency and poor in precision. The method comprises the following steps of: collecting basic parameter information of a vulnerability scanning plug-in through an appointed interface; determining the vulnerability scanning plug-in corresponding to the basic parameter information on the basis of a recording mode corresponding to the appointed interface according to the basic parameter information; storing the vulnerability scanning plug-in in a vulnerability scanning plug-in database; and scanning vulnerability based on the stored vulnerability scanning plug-in in the vulnerability scanning plug-in database. The embodiment of the invention is suitable for a process of scanning vulnerability.

Description

[0001] 【Technical field】 [0002] The present invention relates to the field of information processing, in particular to a vulnerability scanning method, device and computer readable medium. [0003] 【Background technique】 [0004] Many application services will be found to have 0day vulnerabilities, for example, Sql (database) injection, Xss (cross-site scripting attack) vulnerabilities, and upload vulnerabilities. Since these vulnerabilities are often very hidden and will bring great security risks to software and network systems, it is necessary to be equipped with some scanning methods for scanning. [0005] The current common vulnerability scanning method is to obtain the vulnerability scanning plug-ins corresponding to each application service through manual compilation for different application services, and then manually operate the existing vulnerability scanning plug-ins for scanning. However, there are more or less differences between various programs and software, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 唐文韬胡珀郑兴王放郭晶张强范宇河杨勇
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products