A web vulnerability scanning method

A vulnerability scanning and scanning technology, which is applied in the field of web vulnerability scanning, can solve problems such as low scanning efficiency and missing scanning interfaces, and achieve rigorous and reliable vulnerability detection

Active Publication Date: 2021-07-23
SHANGHAI ZHONGTONGJI NETWORK TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problems of missing scanning interfaces and low scanning efficiency in the prior art, the present invention provides a web vulnerability scanning method, which has the characteristics of comprehensive interface detection and higher scanning efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A web vulnerability scanning method
  • A web vulnerability scanning method
  • A web vulnerability scanning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0037] refer to figure 1 As shown, the embodiment of the present invention provides a kind of web vulnerability scanning method, comprises the following steps:

[0038] 101. Obtain a vulnerability scanning task, where the vulnerability scanning task includes target interface information included in the website to be scanned;

[0039] 102. Determine the target webpage corresponding to each target interface information;

[0040] 103. Perform a web vulnerability...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the technical field of complete Internet information, in particular to a web vulnerability scanning method, which solves the problem of incomplete scanning interface and low efficiency in the existing web vulnerability scanning method. Including target interface information included in the website to be scanned; determining a target web page corresponding to each target interface information; and performing web vulnerability scanning on each target web page. The present invention adopts the non-active crawler, that is, captures the user's scanning request and sends it to the backend for security detection. According to the user's request, the proxy can be used to configure the interface to conduct a comprehensive security inspection of the website, and there will be no missing interface, making the vulnerability detection more rigorous and reliable.

Description

technical field [0001] The invention belongs to the technical field of Internet information security, and in particular relates to a web vulnerability scanning method. Background technique [0002] Web application vulnerability scanning technology is one of the important technologies to ensure the security of web applications. Its core idea is to send carefully constructed detection requests to web sites from the perspective of hackers, and judge whether there are specific vulnerabilities in the target site according to the response information. Scan is committed to ensuring the security of web applications at the application layer, together with network layer protection measures such as firewalls and intrusion detection systems, to form a comprehensive security protection for the operating environment of a web application. With the rapid development of web applications in terms of technology and scale, web application vulnerability scanning technology has developed from the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F9/50
CPCG06F9/5027H04L63/1433H04L67/02
Inventor 陈明
Owner SHANGHAI ZHONGTONGJI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products