Penetration testing method and device, computer equipment and storage medium
A technology of penetration testing and testing equipment, applied in the field of network security, can solve the problem of low efficiency of exploiting vulnerabilities and achieve the effect of improving utilization efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0054] The penetration testing method provided by this application can be applied to the application environment in the field of network security, and the application environment includes such as figure 1The computer device 1 and the device under test 2 are shown. The computer device 1 determines the corresponding device 2 to be tested according to the IP address or domain name. The device 2 to be tested can be a server or a switch. Query the vulnerability table in the database according to the relevant information to obtain the target quantification factor of each vulner...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


