Web vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in the field of web vulnerability detection, can solve problems such as low efficiency of web vulnerability detection, and achieve the effect of avoiding low efficiency

Pending Publication Date: 2019-09-27
WEBANK (CHINA)
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a method and device for detecting web vulnerabilities, which are used to solve the technical problem of low efficiency of detecting web vulnerabilities in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web vulnerability detection method and device
  • Web vulnerability detection method and device
  • Web vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] Step 101, receiving a first instruction input by a user, running a preset script file based on the first instruction, and determining a legal IP in the preset IP file.

[0066] Specifically, the IP file is pre-saved in the database of the computer device, wherein the IP file includes the IP of at least one host to be detected, and the IP file may be in the form of an IP list or in other forms. The computer device receives a first instruction input by a user. The computer device opens and executes the instructions in the preset script file based on the first instruction, wherein the script file can be an object-oriented, literal translation computer programming language python, a literal translation script file language JavaScript or C++ language, etc., in This is not a limitation. It should be understood that the computer device may be a server or a computer, and the computing device may be applied in technical fields such as finance, e-commerce, aerospace or biotechno...

Embodiment 2

[0106] The embodiment of the present application provides a device for detecting web vulnerabilities, see figure 2 , the device consists of:

[0107] The determining unit 201 is configured to receive a first instruction input by a user, run a preset script file based on the first instruction, and determine a legal IP in the preset IP file;

[0108] The control unit 202 is used to control the operation of the network connection terminal scanning software Nmap based on the second instruction in the script file, and determine the uniform resource locator URL of each port that provides Web services corresponding to the legal IP;

[0109] A filtering unit 203, configured to filter the URL based on a preset URL whitelist, and generate a URL file based on the filtered URL;

[0110] The detection unit 204 is configured to control the network vulnerability scanning software AWVS to call the URL file based on the third instruction in the script file, and perform vulnerability detectio...

Embodiment 3

[0127] An embodiment of the present application provides a computer device, see Figure 5 , the device comprising:

[0128] Memory 501, configured to store instructions executed by at least one processor;

[0129] The processor 502 is configured to execute instructions stored in the memory to execute the method described in Embodiment 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Web vulnerability detection method and device, and the method comprises the steps: receiving a first instruction input by a user, running a preset script file based on the first instruction, and determining a legal IP in a preset IP file; based on a second instruction in the script file, controlling network connection end scanning software Nmap to run, and determining a uniform resource locator URL of each port which corresponds to the legal IP and provides the Web service; filtering the URL based on a preset URL white list, and generating a URL file based on the filtered URL; based on a third instruction preset in the script file, controlling network vulnerability scanning software AWVS to call the URL file, conducting vulnerability detection on each URL in the URL file, and generating a detection report is generated. The technical problem that in the prior art, the Web vulnerability detection efficiency is low is solved.

Description

technical field [0001] The present application relates to the technical field of financial technology (Fintech), in particular to a method and device for detecting web vulnerabilities. Background technique [0002] With the rapid development of computer technology, more and more network technologies are applied in the financial field, such as fast payment, electronic transfer, etc., and the traditional financial industry is gradually transforming into financial technology (Fintech). In order to ensure the security and reliability of the financial technology (Fintech) field, higher requirements are put forward for network security technology, especially the vulnerability detection in network security. [0003] Vulnerabilities in network security mainly refer to: the hardware, software or data in the system of the network system will be damaged, changed or leaked due to accidental or malicious attacks, resulting in interruption of network services, especially the network syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/1441H04L63/101H04L63/0236
Inventor 刘宇滨
Owner WEBANK (CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products