Vulnerability scanning method, device, electronic equipment and computer readable storage medium

A vulnerability scanning and scanner technology, applied in the field of information security, can solve the problems such as the inability of the scanner to scan systematically, the reduction of scanning efficiency, and the limited performance of web scanners, so as to avoid the data processing process and improve the scanning efficiency.

Active Publication Date: 2021-11-02
BEIJING KNOWNSEC INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003]However, there are some defects in the above-mentioned method of using crawler technology to crawl the URL address of the target system. The tree index is crawled, so the scanner may not be able to perform a more comprehensive system scan. Secondly, due to the performance limitations of the web scanner itself, the processing of data by the web scanner will reduce the scanning efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method, device, electronic equipment and computer readable storage medium
  • Vulnerability scanning method, device, electronic equipment and computer readable storage medium
  • Vulnerability scanning method, device, electronic equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0048] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a vulnerability scanning method, a device, electronic equipment and a computer readable storage medium, and relates to the technical field of information safety. According to the method, after a scanner receives a scanning instruction for a target server, a data collection instruction is sent to a linkage server according to the scanning instruction, so that the linkage server acquires target address data from address data stored in a content distribution network server according to the data collection instruction and processes the target address data; the address data is obtained by the content distribution network server according to the access request; and the scanner receives the processed target address data sent by the linkage server, and performs vulnerability detection on the processed target address data after receiving the vulnerability detection instruction. The scanner obtains address data contained in the access request through the linkage server so as to realize more comprehensive system scanning; the target address data is processed through the linkage server, so that the data processing process of a scanner is avoided, and the scanning efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular, to a vulnerability scanning method, device, electronic equipment, and computer-readable storage medium. Background technique [0002] Existing web vulnerability detection methods generally use web scanners to actively crawl all URL addresses of the target system through crawler technology, and then perform data processing on them by the web scanner, and use the verification code of the vulnerability to crawl The obtained URL address is detected to determine whether there is a vulnerability in the target system. [0003] However, the above-mentioned method of crawling the URL address of the target system using crawler technology has some defects. First, because the crawler technology is implemented based on a program, and needs to be crawled according to a certain directory tree index, it may cause the scanner to be unable to perform updates. Comprehensive sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/57G06F16/955
CPCH04L63/1433H04L67/02G06F21/577G06F16/955G06F2221/034
Inventor 陆永林罗立詹科徐开红曾国涛李静胡锐
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products