Web vulnerability scanning method, system and device, storage medium and computer equipment

A vulnerability scanning and vulnerability technology, applied in the field of computer networks, can solve the problems of unrealistic and complex security testing by security experts

Pending Publication Date: 2021-01-05
CENT SOUTH UNIV
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The computer network system of a modern enterprise is huge and complex, and changes such as updates, modifications, deletio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web vulnerability scanning method, system and device, storage medium and computer equipment
  • Web vulnerability scanning method, system and device, storage medium and computer equipment
  • Web vulnerability scanning method, system and device, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be described in detail below with reference to the accompanying drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0051] In the description of the present invention, the terms "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", " The orientations or positional relationships indicated by "top", "bottom", etc. are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and do not require that the present invention must be constructed and operated in a specific orientation, so they cannot be understood as Limitations on the Invention. The terms "connected" and "connected" used in the present invention should be understood in a broad sense, for example, it can be fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a Web vulnerability scanning method which comprises the following steps: constructing a data packet through a URL crawled by a web crawler, sending the data packet to a plug-in,and performing vulnerability scanning based on the plug-in; sending a request to a Web application server, and obtaining response information to the server; analyzing the response information, and judging whether the vulnerability exists in the server or not to obtain potential safety hazard information; and generating a report file according to the potential safety hazard information; the overall architecture of the Web vulnerability scanner is divided into a main body module and a scanning plug-in module; wherein the main body module is used for information collection work in a penetrationtechnology, and the scanning plug-in module is used for detecting different Web vulnerabilities, so that a Web application vulnerability scanner can detect common Web vulnerabilities, and certain helpcan be brought to testers in penetration work.

Description

technical field [0001] The invention belongs to the technical field of computer networks, and in particular relates to a web vulnerability scanning method, system, device, storage medium and computer equipment. Background technique [0002] As an important application of the network, Web technology can provide entertainment, information, e-commerce and other services. However, the following security problems are also becoming more and more prominent. All famous websites have been attacked by "hackers" maliciously, which has caused huge losses to operators. With the rapid development of Web applications, Web vulnerabilities and their exploiting techniques are also developing rapidly. [0003] Based on the importance of web security, penetration testing for the development and maintenance of web applications has become an indispensable part. Penetration testing from the perspective of attackers will help to discover and identify some hidden security vulnerabilities and risk ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F16/951H04L29/06
CPCG06F21/577G06F16/951H04L63/1433
Inventor 李佳佳
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products