Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device, computer equipment and storage medium for detecting system vulnerabilities

A detection system and vulnerability technology, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as incomplete detection functions of scanning tools, and achieve the effects of shortening security testing time, reducing labor costs, and improving integrity

Active Publication Date: 2022-04-12
CHINA PING AN LIFE INSURANCE CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of this application is to provide a method for detecting system vulnerabilities, aiming to solve the technical problem of incomplete detection functions of existing scanning tools

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, computer equipment and storage medium for detecting system vulnerabilities
  • Method, device, computer equipment and storage medium for detecting system vulnerabilities
  • Method, device, computer equipment and storage medium for detecting system vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0055] refer to figure 1 , a method for detecting system vulnerabilities according to an embodiment of the present application, including:

[0056] S1: Collect the first domain name of the system to be detected and the registration information of the first domain name, and the second domain name of each binding sub-station bound to the system to be detected and the registration information of the second domain name respectively corresponding to each second domain name.

[0057]In this embodiment, the real first domain name and first domain name registration information of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to penetration testing technology, and discloses a method, device, computer equipment, and storage medium for detecting system vulnerabilities, wherein the method for detecting system vulnerabilities includes: collecting the first domain name of the system to be detected and the registration information of the first domain name, and binding The second domain name of each bound substation of the system to be detected and the second domain name registration information corresponding to each of the second domain names; according to the first domain name and the first domain name registration information, each of the second domain names domain name and each second domain name registration information, obtain each port of the system to be detected; judge whether each described port has a crawling function and / or an upload function; if there is a crawling function and / or an upload function, then the Vulnerability scanning is performed on the port of the fetching function and / or uploading function; identifying whether the file type obtained in the vulnerability scanning is a preset type; if it is not a preset type, it is determined that there is vulnerability information.

Description

technical field [0001] The present application relates to the dispatching field, in particular to a method, device, computer equipment and storage medium for detecting system vulnerabilities. Background technique [0002] Existing scanning tools in the industry, such as Appscan, Awvs, etc., do not perform a complete security test on the detection system. They only have partial detection functions, and still need manual intervention in more security testing links, which is not intelligent enough. An intelligent scanning tool is urgently needed to realize the automatic scanning and detection of the detection system, improve the comprehensiveness and integrity of the detection system vulnerabilities, reduce the amount of manual participation, reduce labor costs, and improve detection efficiency. Contents of the invention [0003] The main purpose of this application is to provide a method for detecting system vulnerabilities, aiming at solving the technical problem of incompl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1433
Inventor 陈先亮杨林
Owner CHINA PING AN LIFE INSURANCE CO LTD