Network vulnerability detection method, device, storage medium and computer device

A vulnerability detection and network technology, applied in the field of computer networks, can solve problems such as network vulnerability exposure

Active Publication Date: 2018-12-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a network vulnerability detection method, device, computer-readable storage medium and c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network vulnerability detection method, device, storage medium and computer device
  • Network vulnerability detection method, device, storage medium and computer device
  • Network vulnerability detection method, device, storage medium and computer device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0046] figure 1 It is an application environment diagram of the network vulnerability detection method in one embodiment. refer to figure 1 , the network vulnerability detection method is applied to a network vulnerability detection system. The network vulnerability detection system includes a terminal 110 and a server 120 . Terminal 110 and server 120 are connected via a network. The terminal 110 may specifically be a desktop terminal or a mobile terminal, and the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook compute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network vulnerability detection method, a device, a computer-readable storage medium and a computer device. The method comprises: receiving a network vulnerability detectioninstruction.The network vulnerability detection instruction carries network vulnerability detection task information. The network vulnerability detection task information comprises a network domain name corresponding to an object to be detected; generating a domain name verification file corresponding to the network domain name. The domain name verification file is used for transmitting to an object to be detected and storing to a designated position in the object to be detected; searching a domain name verification file from the designated position according to the network domain name; whenthe domain name verification file is found, network vulnerability detection is performed on the object to be detected according to the network vulnerability detection task information. The scheme provided by the present application can guarantee the security of the user system.

Description

technical field [0001] The present application relates to the technical field of computer networks, in particular to a network vulnerability detection method, device, computer-readable storage medium and computer equipment. Background technique [0002] A network vulnerability is a vulnerability that exists in a computer network system and may cause damage to components and data in the system. Specifically, network vulnerabilities are defects in the specific implementation of computer equipment hardware, software, or protocols, or system security policies. If there are network vulnerabilities in the system, it will allow attackers to access or destroy the system without authorization. , is a huge security risk. [0003] In order to detect and find network vulnerabilities existing in the system, users can input information such as the network domain name or website address to be detected into the public security vulnerability scanning tools on the network platform, and use t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1433H04L63/20H04L61/4511
Inventor 胡惠超杨志航石雪梅马松松黄东庆郭润增耿志军周俊
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products