Vulnerability scanning method and vulnerability scanning device
A vulnerability scanning and scanning method technology, applied in the field of vulnerability scanning, can solve the problem of high labor cost and achieve the effect of alleviating the high labor cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] An embodiment of the present invention provides a vulnerability scanning method, such as figure 1 As shown, applied to the detector, the detector is installed between the terminal device and the server. The scanning methods for this kind of vulnerability include:
[0055] Step S103: The detector obtains a vulnerability scanning request sent by the user to scan the vulnerability of the asset, where the vulnerability scanning request includes the name information of the asset.
[0056] Step S104: The detector reads the address information of the asset according to the name information, where the address information is address information established in advance based on the user's historical access information, and the historical access information includes the name information and address information of the historically accessed assets.
[0057] Step S105: The detector pushes address information to the vulnerability scanner of the asset, so that the vulnerability scanner can scan...
Embodiment 2
[0081] A vulnerability scanning device provided by an embodiment of the present invention, such as image 3 As shown, the vulnerability scanning device is installed between the terminal device and the server, and the vulnerability scanning device includes:
[0082] The first obtaining module 300 is configured to obtain a vulnerability scanning request sent by a user to scan for vulnerabilities of an asset, wherein the vulnerability scanning request includes the name information of the asset;
[0083] The reading module 400 is used to read the address information of the asset according to the name information, where the address information is the address information established in advance based on the user's historical access information, and the historical access information includes the name information and address information of the historically accessed assets;
[0084] The push module 500 is used to push address information to the vulnerability scanner of the asset so that the vul...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com