Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Web vulnerability scanning method

A vulnerability scanning and to-be-scanned technology, applied in the field of web vulnerability scanning, can solve the problems of long time consumption and slow web vulnerability scanning efficiency, saving time, avoiding repeated scanning, and improving scanning efficiency.

Active Publication Date: 2018-05-22
西安交大捷普网络科技有限公司
View PDF9 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the technical problems of slow web vulnerability scanning efficiency and too long time spent in the prior art, the present invention provides a web vulnerability scanning method, which is specifically implemented through the following technical solutions:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web vulnerability scanning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0016] Web vulnerability scanning methods, such as figure 1 , crawl the URL of the website to be scanned and store it in the queue to be scanned, perform web fingerprint identification on the URL in the queue to be scanned to obtain the fingerprint information of the website, and call the scanning tool corresponding to the fingerprint information of the website to perform a scan on the website to be detected Scanning, where fingerprint information includes the type of operating system, web server used, database type, and scripting language of the web application. By identifying and calling different types of plug-ins to scan different website fingerprint information, it saves a lot of scanning time and improves the efficiency of vulnerability ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network security, and specifically relates to a web vulnerability scanning method, the method comprises the following steps: crawling a URL of a to-be-scanned website and storing the URL in a to-be-scanned queue, performing web fingerprint identification for the URL in the to-be-scanned queue to obtain fingerprint information of the website, callinga scanning tool corresponding to the fingerprint information of the website to scan the to-be-scanned website, wherein, aiming at a periodical scanning task, whether a page is changed is judged through calculating whether a MD5 value of the current page is identical to the MD5 value recorded last time, if the page is not changed, scanning again is not needed, a lot of time can be saved, meanwhile,before scanning a to-be-scanned task, firstly fingerprint identification is executed for the URL, thus, the fingerprint information corresponding to the URL is obtained, a plugin corresponding to thefingerprint information is called to scan the page, calling all the plugins to scan each task is avoided, and a lot of time is saved.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a web vulnerability scanning method. Background technique [0002] At present, with the development of the Internet, loopholes inevitably appear in web programs or websites. Hackers often use network loopholes to steal corporate secret information and Internet users' private information, etc., posing a threat to Internet information security. [0003] The web vulnerability scanning methods in the prior art basically use scanning tools or hardware scanning devices to scan the crawled vulnerabilities. The vulnerability scanning tools include various common types of vulnerability plug-ins. The recognition rate reduces false positives and false negatives. Generally, the system will have a large number of vulnerability identification plug-ins and complex analysis mechanisms. For large websites (websites with more than 10,000 page files), the processing speed is to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06G06F21/57
CPCH04L9/0643H04L63/0861H04L63/1433H04L63/145G06F21/577
Inventor 陈晓兵何建锋
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products