Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability scanning method and system based on plug-in technology

A vulnerability scanning and plug-in technology, applied in the field of network security, can solve problems such as difficult to use

Inactive Publication Date: 2019-09-20
西安交大捷普网络科技有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, NASL can also ensure that the written script can only be used for testing against the destination host, making it difficult for the writer to use the written script for malicious purposes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and system based on plug-in technology
  • Vulnerability scanning method and system based on plug-in technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0031] Such as figure 1 As shown, the vulnerability scanning method based on plug-in technology includes:

[0032] S1 creates a scan task and configures scan parameters, and sends a scan request;

[0033] The parameters of the scan task at least include: scan mode, policy template, task execution priority, IP address of the target to be scanned, whether the target to be scanned is alive and alive port detection, weak password guessing, plug-in scan timeout, socket timeout Limit, TCP / UDP port scan timeout and port range, port scan speed, port scan mode.

[0034] S2 receives the scanning request, and loads the plug-in according to the scanning parameters.

[0035] S3 traversal plug-in, calls NASL script, and performs simulated attack;

[0036] The scanning of each scanning parameter is achieved by loading the corresponding plug-in. After t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide a vulnerability scanning method and system based on a plug-in technology. When the vulnerability scanner starts to work; reading plug-in numbers, calling an NASL script engine and transmitting corresponding data parameters; and then loading, explaining and executing scripts to test and check an actual computer system or network, analyzing a return result of the tested object to detect whether a vulnerability which can be used by attacks exists in the system or network, and outputting or storing the detected vulnerability information of the object. On the basis of the plug-in technology and the NASL script engine, the NASL script can be called better and faster, then the target host is subjected to simulated attack, and then vulnerabilities are found in time.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a vulnerability scanning method and system based on plug-in technology. Background technique [0002] With the deepening of enterprise informatization, computer network plays an increasingly important role in the enterprise. However, due to the typical interconnection and openness of the Internet, the internal computer network system of an enterprise is extremely easy to become the target and carrier of malicious attacks. How to better protect the computer network security within the enterprise is also being valued by more and more enterprises. [0003] Network vulnerability scanning plays an increasingly important role in ensuring network security. With the help of network vulnerability scanning, people can find open ports, services provided, certain system information, wrong configurations, known security vulnerabilities, etc. in the network and hosts. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F9/445
CPCG06F9/44526G06F21/577G06F2221/034
Inventor 何建锋陈宏伟
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products