Vulnerability detection method and device, electronic equipment and computer readable storage medium

A vulnerability detection and storage medium technology, applied in the field of system security, can solve problems such as failure to detect successfully

Pending Publication Date: 2021-03-16
北京知道未来信息技术有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method can only detect whether there is a loophole from the software level. If it is due to a system programming error or other system-level problems, it will not be able to detect successfully

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device, electronic equipment and computer readable storage medium
  • Vulnerability detection method and device, electronic equipment and computer readable storage medium
  • Vulnerability detection method and device, electronic equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0046] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vulnerability detection method and device, electronic equipment and a computer readable storage medium, and the method comprises the steps: determining a target port in an open state by scanning a plurality of ports of to-be-detected equipment; obtaining a corresponding target detection program from a plurality of pre-stored detection programs according to the port information of the target port, wherein the target detection program is a vulnerability concept verification POC program; and finally, running the target detection program to detect whether the to-be-detected equipment has system vulnerabilities or not. In the scheme, whether the equipment has the system vulnerability or not is detected by scanning the port and running the corresponding vulnerability concept verification program, so that the vulnerability condition on the system level can be successfully detected, and the phenomenon that the equipment is subsequently attacked due to the vulnerabilityon the system level is avoided.

Description

technical field [0001] The present application relates to the technical field of system security, in particular, to a vulnerability detection method, device, electronic equipment and computer-readable storage medium. Background technique [0002] In a network system scenario, such as a system scenario composed of many networked devices such as smart phones or Internet of Things devices, there is a malicious network, that is, a networked device in the network contains one or more malicious programs. Attackers can use the relevant command or control software to manipulate this network to perform various malicious actions that require large-scale automation. [0003] With the advancement of science and technology and the development of network technology, various smart devices are becoming more and more popular in the daily life of the family, but the existing security problems are also becoming more and more prominent. In the worst case, the attacker may cause the smart devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 刘锋
Owner 北京知道未来信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products