Scanning method for network station leakage
A vulnerability scanning and security technology, which is applied in the field of website security vulnerability scanning based on complete crawling, can solve problems such as insufficient crawling range, and achieve the effect of improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] In the following, a virtual website www.abc.com will be taken as an example, and the method for scanning website security vulnerabilities of the present invention will be further described through specific operations on the website.
[0027] (1) Scanning stage:
[0028] Such as figure 2 As shown, first obtain links based on fixed scanning rules according to the fixed scanning rules in the database. These links are links that can be guessed directly, such as: \password.ini, \login.asp, \_vti_bin\, \test.pl, \ config.ini, \rootlogin.asp…….
[0029] Add these links directly obtained based on the fixed scanning rules together with the website name www.abc.com into the queue of web page links to be scanned.
[0030] Each link in the web page link queue is scanned in turn, and at the same time, new links found during the web page scanning process are added to the web page link queue. For links obtained based on fixed scanning rules, by analyzing the server response messag...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 