Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Web vulnerability scanning method, device and system

A vulnerability scanning and vulnerability technology, applied in the field of communication, can solve the problems of user information leakage, enterprise database being dragged, taking a long time, etc., to achieve the effect of maintaining security

Active Publication Date: 2020-12-08
BEIJING QIHOO TECH CO LTD +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, with the development of the Internet, there will inevitably be loopholes in web programs or websites. Hackers often use network loopholes to steal corporate secret information and Internet users’ private information, posing a threat to Internet information security.
[0003] In the process of implementing the embodiments of the present invention, the inventors have found that there are at least the following problems in the prior art: at present, the discovery of vulnerabilities basically uses scanning tools or hardware scanning devices, but whether it is scanning tools or hardware scanning devices, all Based on the process of "analyzing vulnerabilities—extracting vulnerability identification features—turning into a vulnerability scanning library—upgrading", it will take a long time from the discovery of vulnerabilities to the identification of vulnerabilities, for example, it often takes 1 to 3 months or even It takes a longer time, but in reality there are more and more vulnerabilities-based attacks, and the long time lag between vulnerability discovery and vulnerability identification often causes corporate databases to be dragged and user information leaked. information security poses a significant risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web vulnerability scanning method, device and system
  • Web vulnerability scanning method, device and system
  • Web vulnerability scanning method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure, and to fully convey the scope of the present disclosure to those skilled in the art.

[0018] figure 1 A flowchart of a WEB vulnerability scanning method provided by an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes the following steps:

[0019] Step S110: Obtain and store the vulnerability scanning tool provided by the vulnerability detection terminal, wherein the vulnerability scanning tool is an extensible scanning tool written for specific website vulnerabilities. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a WEB vulnerability scanning method, apparatus and system for at least solving the problem that the network information security of internet users is threatened due to the overlong interval time between the discovery and identification of vulnerabilities in the prior art. The WEB vulnerability scanning method comprises the following steps: obtaining and storing a vulnerability scanning tool provided by a vulnerability detection terminal, wherein the vulnerability scanning tool is an extensible scanning tool programmed for a specific website vulnerability; determining the applicable vulnerability type of the vulnerability scanning tool provided by the vulnerability detection terminal, and displaying the vulnerability scanning tool provided by the vulnerability detection terminal and the applicable vulnerability type; obtaining a vulnerability scanning tool selection request sent by a to-be-detected website, and determining the vulnerability scanning tool corresponding to the vulnerability scanning tool selection request; and scanning the to-be-detected website through the vulnerability scanning tool corresponding to the vulnerability scanning tool selection request.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device and system for scanning WEB vulnerabilities. Background technique [0002] At present, with the development of the Internet, there will inevitably be loopholes in web programs or websites. Hackers often use network loopholes to steal corporate secret information and Internet users' private information, etc., posing a threat to Internet information security. [0003] In the process of implementing the embodiments of the present invention, the inventors have found that there are at least the following problems in the prior art: at present, the discovery of vulnerabilities basically uses scanning tools or hardware scanning devices, but whether it is scanning tools or hardware scanning devices, all Based on the process of "analyzing vulnerabilities—extracting vulnerability identification features—turning into a vulnerability scanning library—upgrading"...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1433H04L67/02
Inventor 白健葛珅陈得福韩钰
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products