Vulnerability scanning method and system based on plug-in technology
A vulnerability scanning and plug-in technology, applied in the field of network security, can solve problems such as difficult to use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0031] Such as figure 1 As shown, the vulnerability scanning method based on plug-in technology includes:
[0032] S1 creates a scan task and configures scan parameters, and sends a scan request;
[0033] The parameters of the scan task at least include: scan mode, policy template, task execution priority, IP address of the target to be scanned, whether the target to be scanned is alive and alive port detection, weak password guessing, plug-in scan timeout, socket timeout Limit, TCP / UDP port scan timeout and port range, port scan speed, port scan mode.
[0034] S2 receives the scanning request, and loads the plug-in according to the scanning parameters.
[0035] S3 traversal plug-in, calls NASL script, and performs simulated attack;
[0036] The scanning of each scanning parameter is achieved by loading the corresponding plug-in. After t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com