Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

80 results about "Vulnerability scanner" patented technology

A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses. In plain words, these scanners are used to discover the weaknesses of a given system.

System and method for passively identifying encrypted and interactive network sessions

The system and method for passively identifying encrypted and interactive network sessions described herein may distribute a passive vulnerability scanner in a network, wherein the passive vulnerability scanner may observe traffic travelling across the network and reconstruct a network session from the observed traffic. The passive vulnerability scanner may then analyze the reconstructed network session to determine whether the session was encrypted or interactive (e.g., based on randomization, packet timing characteristics, or other qualities measured for the session). Thus, the passive vulnerability scanner may monitor the network in real-time to detect any devices in the network that run encrypted or interactive services or otherwise participate in encrypted or interactive sessions, wherein detecting encrypted and interactive sessions in the network may be used to manage changes and potential vulnerabilities in the network.
Owner:TENABLE INC

WEB vulnerability scanning method and vulnerability scanner based on fingerprint recognition technology

The invention provides a WEB vulnerability scanning method and a vulnerability scanner based on fingerprint recognition technology. Since a feature library based security scanning scheme is used to replace a common site security vulnerability scanning scheme based on fully crawling, the scanner is improved in terms of accuracy of vulnerability scanning, flexibility of further processing after detecting vulnerabilities, efficiency of discovering vulnerabilities, and the like, and accordingly a new scheme is provided for the system security scanning and the network vulnerability scanning. The scanner comprises a user side, a browser, a scanning host and a WEB server. According to the abstract appended drawing, the scanning host comprises a control module, a scan parameter setting module, a scan engine module, a WEB fingerprint library module and a WEB vulnerability library module. The user sets scanning parameters in the scan parameter setting module through the control module, the scanning engine is firstly used for fingerprint recognition on the basis of sent parameters, and finally, the vulnerability library is used for testing site vulnerabilities and sending a test report. The scanner is capable of accurately and rapidly helping users to test and analyze vulnerability of the target website, and directly perform corresponding operations on the browser with no need of installation of client side software.
Owner:SICHUAN UNIV

System and method for managing network vulnerability analysis systems

Systems and methods to manage multiple vulnerability scanners distributed across one or more networks using a distributed security management system, herein called a Lightning Console. By distributing multiple scanners across a network, the work load of each scanner may be reduced to significantly reduce the impact on the network routing and switching infrastructure. In addition, scanners may be placed directly behind firewalls for more thorough scanning. Further, scanners may be placed closer to their scanned networks. By placing vulnerability scanners closer, the actual scanning traffic does not cross the core network switch and routing fabric, thereby avoiding potential network outages due to scanning activity. In addition, the closer distance of the scanners to the scanned targets speeds scan times by reducing the distance that the packets must traverse.
Owner:TENABLE INC

Method and apparatus to secure a computing environment

A method and apparatus for a surround security system is provided. The surround security system is embodied on a computer readable medium and includes a packet enforcement engine to screen packets to and from the network and a TCP / IP stack, an application enforcement engine to screen packets to and from the TCP / IP stack and applications on the computer system, a file monitor to verify integrity of files on the computer system and a vulnerability scanner to ensure that the computer system complies with a set level of security. The surround security system provides security which protects accesses through the TCP / IP stack for applications, and an operating system of the computer system.
Owner:RPX CORP

Method and device for scanning vulnerability

The embodiment of the invention provides a method and a device for scanning vulnerability. The method comprises the steps of obtaining a client side message by a reverse scanning agent module; sending the client side message to a vulnerability scanner by the reverse scanning agent module, and enabling the vulnerability scanner to identify vulnerabilities of a client side according to the client side message; or identifying the vulnerabilities of the client side by the reverse scanning agent module according to the client side message, and sending the vulnerabilities of the client side to the vulnerability scanner; receiving a control command of the vulnerability scanner by the reverse scanning agent module, changing a working way and / or a working mode according to the control command, and updating a vulnerability rule. According to the method and the device provided by the embodiment of the invention, the client side message is obtained through the reverse scanning agent module, the client side message is analyzed so as to identify the vulnerabilities existing in the client side, and analysis on a safety problem of the client side is added on the basis of the safety problem of a remote detection server, so the safety detection on the whole network environment is realized.
Owner:NSFOCUS INFORMATION TECHNOLOGY CO LTD +1

Vulnerability contextualization

An embodiment of the disclosure provides a method for contextualizing vulnerabilities. The method is performed by a server including a processor and a non-transitory computer-readable medium with computer-executable instructions stored thereon, such that when the instructions are executed by the processor, the server performs the method including: (a) importing raw vulnerability data from a vulnerability scanner, the raw vulnerability data including one or more vulnerability data wherein each vulnerability data includes a vulnerability identification (ID) and an asset value; (b) importing an asset inventory from an asset database; (c) merging the asset inventory and the raw vulnerability data to obtain contextual vulnerability data, the contextual vulnerability data including one or more vulnerability data linked to a vulnerability ID, an asset value, and an asset owner; (d) categorizing the contextual vulnerability data; and (e) generating a report of the categorized contextual vulnerability data.
Owner:AETNA

Web vulnerability scanning system

InactiveCN105791273ASolve the problem of low efficiency of crawlersIncrease elasticityData switching networksMessage queueMirror image
The invention discloses a web vulnerability scanning system, comprising a flow acquisition module, used for acquiring web system access flow of a user by a flow mirror image port of a switch; a flow storage module, used for storing the flow in a first message queue; a scanning module, used for scanning the flow according to a scanning rule; and a vulnerability information storage module, used for storing vulnerability information scanned by the scanning module. According to the web vulnerability scanning system disclosed by the invention, the flow is acquired by the switch in a bypass mode, the problem of low crawler efficiency of a traditional web vulnerability scanner is solved, an effective user cookie can be loaded to simulate a real request of a user, meanwhile, the distributed scanning mechanism of the web vulnerability scanning system disclosed by the invention improves the elasticity of the scanning system, and moreover, the web vulnerability scanning system improves the scanning logic to a rule level, so the flexibility of the scanning system is improved.
Owner:SHANGHAI CTRIP COMMERCE CO LTD

Vulnerability scanner and plug-in scheduling method thereof

The invention belongs to the field of network security, in particular to a vulnerability scanner and a plug-in scheduling method thereof. The method comprises the following steps that: starting the vulnerability scanner, and identifying whether a target to be scanned is a host or network security equipment after a vulnerability scanning task is received; if the target to be scanned is the host, detecting the operating system of the host and a deployed service type, and selecting a preset scanning module according to the operating system and the service type; and if the target to be scanned isthe network security equipment, detecting the system type and the equipment type of the network security equipment, selecting a preset scanning module, and calling a plug-in recorded in the selected scanning module. The invention also discloses a scanner. On the basis of the above operating system type of the host, the service type or the operating system type and the equipment type of the networkequipment, the corresponding plug-in module can be selected and called, then, the corresponding plug-in is loaded into memory, and finally, the plug-in in the memory is read to be executed. Therefore, memory space is saved, and scanning speed is quickened.
Owner:西安交大捷普网络科技有限公司

Systems and methods facilitating self-scanning of deployed software applications

In a system for facilitating detection of vulnerabilities in a deployed software application, a software component (also called a self-scanning component) is provided for integration with the software application. The self-scanning component is configured to detect one or more conditions associated with the deployment of the software application and, upon the detection of such condition(s), to collect and / or transmit at least a portion of the application code to a vulnerability scanner. The self-scanning component can receive a vulnerability report from the scanner and can present the report as received or an analysis of the report. The presentation can be a display or inclusion of the report or analysis thereof in a log generated by the software application.
Owner:VERACODE

Web vulnerability scanning method, system and device, storage medium and computer equipment

The invention provides a Web vulnerability scanning method which comprises the following steps: constructing a data packet through a URL crawled by a web crawler, sending the data packet to a plug-in,and performing vulnerability scanning based on the plug-in; sending a request to a Web application server, and obtaining response information to the server; analyzing the response information, and judging whether the vulnerability exists in the server or not to obtain potential safety hazard information; and generating a report file according to the potential safety hazard information; the overall architecture of the Web vulnerability scanner is divided into a main body module and a scanning plug-in module; wherein the main body module is used for information collection work in a penetrationtechnology, and the scanning plug-in module is used for detecting different Web vulnerabilities, so that a Web application vulnerability scanner can detect common Web vulnerabilities, and certain helpcan be brought to testers in penetration work.
Owner:CENT SOUTH UNIV

Web vulnerability scanning method and vulnerability scanner

The invention relates to a web vulnerability scanning method and a vulnerability scanner. The web vulnerability scanning method comprises the following steps: deploying a plurality of scanning nodes;scanning the asset information of the target software system and the asset information of the target server, and carrying out web page intelligent crawling after completing preliminary information collection; after crawling is completed, exploring different detection points in the request, analyzing the URL to be detected, and decomposing to obtain all possible detection points; cleaning all the detection point data, completing preliminary screening, analyzing and counting to obtain the page view and the access sequence of different URLs of the target, judging whether scanning is needed or notaccording to the content change of URL pages, if scanning is needed, performing statistical classification on results, adding labels, and otherwise, giving up scanning; and judging whether a vulnerability exists or not according to a statistical result, verifying the accuracy of the vulnerability if the vulnerability exists, and otherwise, giving up the operation. The method is beneficial to improving the efficiency and verifying the accuracy of the vulnerability.
Owner:江苏亨通工控安全研究院有限公司

Functional language source code vulnerability scanner

A code scanning system has a syntax generation component that receives source code and generates an abstract syntax tree file. The system includes a white list of permitted pure functions, and a black list of prohibited impure functions. In addition, the system includes a static code analyzer for performing static analysis of the source code. The static code analyzer includes a function analyzer that receives the AST file and identifies the functions. Each function is compared to the white list, and if it is present, marked as permitted in a static analysis file. If the function is not on the white list, it is compared to the black list. If it is present on the black list, it is marked as prohibited in the static analysis file. If the function is not on the white or black list, it is marked as “unknown” and subjected to manual analysis.
Owner:STATE FARM MUTUAL AUTOMOBILE INSURANCE

Vulnerability scanning method and system based on plug-in technology

The invention aims to provide a vulnerability scanning method and system based on a plug-in technology. When the vulnerability scanner starts to work; reading plug-in numbers, calling an NASL script engine and transmitting corresponding data parameters; and then loading, explaining and executing scripts to test and check an actual computer system or network, analyzing a return result of the tested object to detect whether a vulnerability which can be used by attacks exists in the system or network, and outputting or storing the detected vulnerability information of the object. On the basis of the plug-in technology and the NASL script engine, the NASL script can be called better and faster, then the target host is subjected to simulated attack, and then vulnerabilities are found in time.
Owner:西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products