Method, device, computer equipment and storage medium for detecting system vulnerabilities
A detection system and vulnerability technology, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as incomplete detection functions of scanning tools, and achieve the effects of shortening security testing time, reducing labor costs, and improving integrity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0055] refer to figure 1 , a method for detecting system vulnerabilities according to an embodiment of the present application, including:
[0056] S1: Collect the first domain name of the system to be detected and the registration information of the first domain name, and the second domain name of each binding sub-station bound to the system to be detected and the registration information of the second domain name respectively corresponding to each second domain name.
[0057]In this embodiment, the real first domain name and first domain name registration information of...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


