Method for realizing loophole scanning

A vulnerability scanning and implementation method technology, applied in the network field, can solve the problems of fixed scanning method, inflexibility, and single vulnerability scanning method, and achieve the effect of convenient operation and accurate testing

Inactive Publication Date: 2004-12-29
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage is that the conventional scanning design often does not perform further detection processing after detecting superficial vulnerabilities, so it can only prevent some simple hackers from detecting and attacking, and does not deal with deeper vulnerabilities, which will give some Skilled hackers have left a breakthrough; in addition, the vulnerability scanning method is single, and for different targets, the scanning method is fixed and not flexible enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing loophole scanning
  • Method for realizing loophole scanning
  • Method for realizing loophole scanning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] This vulnerability scanning implementation method is applied to the S219 Dongfang.com server security enhancement platform, mainly for simulated attack tests such as vulnerability scanning.

[0032] Vulnerability scanning tests mainly include common Web service vulnerabilities such as HTTP and CGI (Common Gateway Interface) and mail service vulnerabilities such as POP (receiving email) and SMTP. The schematic diagram of the scanning method of the present invention is shown in figure 1 .

[0033] Such as figure 1 As shown: the user uses a web browser to remotely control the remote scanning host, and through the control platform on the scanning host, the user sets the scanning depth and scanning method (that is, chooses to perform SMTP scanning or HTTP vulnerability scanning of the Web server), and uses The function of the scanning module expands the scanning depth from single scanning to secondary scanning or even deeper scanning; after setting, you can use the vulnera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for scanning loophole which is realized by a loophole scanner comprising a user end, a browser, a scanning host machine and a destination host, wherein the scanning host machine portion comprises a control platform, a scanning mode configuration module, a scanning module and a loophole library, the scanning mode configuration module is embedded in the control platform, the user end performs remote control to the remote scanning host machine through Web browsers.

Description

technical field [0001] The invention relates to a method for implementing vulnerability scanning, in particular to a method for automatically detecting security weaknesses of remote or local hosts, and belongs to the field of network technology. Background technique [0002] Through literature search, it is found that in the article "Design and Implementation of Network Vulnerability Scanner" written by Li Zhiqiang of IBM (International Business Machines Corporation) (source: IBM "developerWorks Special Issue" November 2002), the vulnerability scanner technology has been discussed. Detailed description: Vulnerability scanners are used to automatically detect security weaknesses of remote or local hosts, and are divided into two types: host vulnerability scanners and network vulnerability scanners. The network vulnerability scanner remotely detects the services of different ports of the target host TCP / IP (a set of communication protocols used in the network, including Transm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
Inventor 李建华李翔张全海时安军陈夕华
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products