Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability detection method and device and computer equipment

A vulnerability detection and vulnerability technology, which is applied to computer security devices, calculations, instruments, etc., can solve the problems of lack of universality, redundancy, and high requirements for security testers.

Inactive Publication Date: 2020-03-24
北京长亭未来科技有限公司
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional vulnerability detection software detects vulnerabilities by writing codes, which has the following defects: well-written codes have high requirements for security testers, and most vulnerability detection methods are relatively simple, which will cause a large amount of redundant code to be written. Use in different programming language environments, may need to use different programming languages ​​to develop vulnerability detection software, there is no universal and once-and-for-all solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device and computer equipment
  • Vulnerability detection method and device and computer equipment
  • Vulnerability detection method and device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0020] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability detection method which comprises the following steps: acquiring a configuration file which comprises a rule set for detecting a specific vulnerability, constructing an HTTP request data packet according to the rule set for detecting the specific vulnerability, and detecting whether a vulnerability exists or not according to the HTTP request data packet. Theinvention further discloses a vulnerability detection device and computer equipment. According to the technical scheme, security testers can conduct vulnerability detection more conveniently.

Description

technical field [0001] The invention relates to the technical field of loophole detection, in particular to a loophole detection method, device and computer equipment. Background technique [0002] In network security and endpoint security, vulnerability detection and risk prevention is an important topic. Traditional vulnerability detection software detects vulnerabilities by writing codes, which has the following defects: well-written codes have high requirements for security testers, and most vulnerability detection methods are relatively simple, which will cause a large amount of redundant code to be written. In different programming language environments, it may be necessary to develop vulnerability detection software in different programming languages, and there is no universal and one-size-fits-all solution. Contents of the invention [0003] It is an object of the present application to overcome the above-mentioned problems or to at least partially solve or allevi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 龚潇张子墨李扬
Owner 北京长亭未来科技有限公司