CN103685228A - Website vulnerability rapid scanning method and device - Google Patents

Website vulnerability rapid scanning method and device Download PDF

Info

Publication number
CN103685228A
CN103685228A CN201310476173.6A CN201310476173A CN103685228A CN 103685228 A CN103685228 A CN 103685228A CN 201310476173 A CN201310476173 A CN 201310476173A CN 103685228 A CN103685228 A CN 103685228A
Authority
CN
China
Prior art keywords
website
party
application
scanning
reptile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310476173.6A
Other languages
Chinese (zh)
Other versions
CN103685228B (en
Inventor
龙专
李纪峰
赵武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qianxin Technology Group Co Ltd
Secworld Information Technology Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310476173.6A priority Critical patent/CN103685228B/en
Publication of CN103685228A publication Critical patent/CN103685228A/en
Application granted granted Critical
Publication of CN103685228B publication Critical patent/CN103685228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a website vulnerability rapid scanning method and device. The method comprises that all links of a website are obtained from a search link base of a search engine; vulnerability scanning is implemented on the obtained links; a third-party application of the website is identified, and vulnerability scanning matching the third-party application is implemented for the applications; whether the third-party application is over an N-level catalog is determined, and if yes, vulnerability scanning is not carried out on the third-party application; and if the third-part application is below the N-level catalog, a vulnerability test URL (Uniform Resource Locator) is constructed for vulnerability test, wherein N is an integral number greater than 1. According to the method and device of the invention, a top-speed vulnerability scanning effect can be realized for a user who uses a vulnerability scanning platform for the first time, and the user experience is greatly improved.

Description

A kind of website leak fast scanning method and equipment
Technical field
The present invention relates to field of computer technology, relate in particular to a kind of net vertical station leak fast scanning method and equipment.
Background technology
User has a kind of feeling of freshness when using for the first time certain product, all wish the function of to-be-experienced product as early as possible.For web portal security scanning product, be also like this, when user is scanned website first in prior art, need to expend a large amount of time, mainly because scanning platform is not done any special optimization for new user, tend to the portion that connects with regard to class carry out item by item conventional sweep.Yet, when user has just started to contact this series products, various functions for web portal security scanning product may and be unfamiliar with, wish to see for oneself as soon as possible the various functions of product, but conventional sweep extremely consuming time makes user in the short time, cannot carry out smoothly other operations, finally causes greatly reducing user's experience.
Summary of the invention
In view of the above problems, propose the present invention to a kind of a kind of website leak fast scanning method and equipment that overcomes the problems referred to above or address the above problem is at least in part provided, can accelerate the speed of vulnerability scanning.
Embodiments of the invention provide a kind of website leak fast scanning method, comprising: from the search chained library of search engine, obtain the all-links under this website; Described link of obtaining is carried out to vulnerability scanning; Third party application to website is identified, the vulnerability scanning matching for third party's application of described website; And more than judging whether third party's application is positioned at N level catalogue, if so, do not carry out third party and apply vulnerability scanning; If described third party's application is positioned at below N level catalogue, construct leak test uniform resource position mark URL and carry out leak test, wherein N is greater than 1 integer.
Alternatively, described from the search chained library of search engine, obtain the step of the all-links under this website before, also comprise: judgement for the scanning of the domain name of described website whether for scanning first, if, in judgement search chained library, whether the reptile interface of this website is available, if so, from the search chained library of search engine, obtains the all-links under this website, otherwise, start spider or reptile program is obtained the all-links under this website.
Alternatively, the described third party to website application is identified, and the step of the vulnerability scanning matching for third party's application of described website comprises: the title of obtaining third party's application; And according to preset third party's application and the corresponding relation of vulnerability scanning method, carry out the vulnerability scanning of third party being applied to coupling.
Alternatively, the step of obtaining the title of third party's application described in comprises: the title of extracting third party application according to the copyright information of website; Or according to the MD5 that third party applies distinctive Cascading Style Sheet CSS or JavaScript file, judge, identify that website used is the title of third party application; Or what according to the log file of third party's application, judge website use is the title of third party application.
According to another aspect of the present invention, also provide a kind of website leak rapid scanning equipment, it comprises: reptile is optimized module, and it is suitable for obtaining the all-links under this website from the search chained library of search engine; Scan module, it is suitable for described link of obtaining to carry out vulnerability scanning, the third party application of website is identified to the vulnerability scanning matching for third party's application of described website; Leak test module, it is suitable for judging that third party applies whether is positioned at the above catalogue of N level, if, do not carry out third party and apply vulnerability scanning, wherein N is greater than 1 integer, if described third party application is positioned at below N level catalogue, constructs leak test URL and carries out leak test.
Alternatively, equipment also comprises: scan first judge module, whether it is suitable for judging to the scanning of the domain name of described website for scanning first, if not scanning and directly exit first; Reptile interface judge module, its be suitable for scan first judge module judgement to the scanning of the domain name of described website when scanning first, whether the reptile interface of this website in chained library is searched in judgement available; Common reptile module, it is suitable for reptile interface at reptile interface judge module judgement search engine when unavailable in described website, enables spider or reptile program is obtained the all-links under this website; Wherein, when in reptile interface judge module judgement search chained library, the reptile interface of this website can be enabled, described reptile is optimized module and obtain the all-links under this website from the search chained library of search engine.
Alternatively, described scan module comprises: acquiring unit, and it is suitable for obtaining the title of third party's application; And vulnerability scanning unit, it is suitable for, according to preset third party's application and the corresponding relation of vulnerability scanning method, carrying out the vulnerability scanning of third party being applied to coupling.
Alternatively, described acquiring unit obtains the title of third party's application in the following way: the title of extracting third party application according to the copyright information of website; Or according to the MD5 that third party applies distinctive CSS or JAVASCRIPT file, judge, identify that website used is the title of third party application; Or what according to the log file of third party's application, judge website use is the title of third party application.
Technical scheme from the embodiment of the invention described above, embodiments of the invention have following beneficial effect: use the chain that obtains website from the chained library the inside of search to fetch original reptile program of replacing, sweep speed can improve more than 10 times, originally need spider or the website of reptile program about 30 minutes, can in 1~2 minute, complete scanning.Because embodiments of the invention have reduced sweep time effectively, make to use for the first time the user of vulnerability scanning platform to experience very fast vulnerability scanning effect, user experiences and is greatly improved.
Accompanying drawing explanation
Fig. 1 shows according to the flow chart of the website leak fast scanning method 100 of an embodiment of the invention; And
Fig. 2 shows the structured flowchart of website leak rapid scanning equipment 200 according to another implementation of the invention.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, yet should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can be by the complete technology high-ranking official who conveys to this area of the scope of the present disclosure.
With reference to figure 1, wherein schematically show the flow chart of website leak fast scanning method 100 according to an embodiment of the invention.As shown in Figure 1, shown in, method 100 comprises: step S101, S103, S105, S107, S109 and S111, method 100 starts from step S101, wherein, from the search chained library of search engine, obtains the all-links under this website.
Alternatively, in step S101, the various links that before having preserved in the search chained library of search engine, reptile or spider obtain, can therefrom extract the peer link of required website, and regain data without starting reptile.
Alternatively, also can obtain link relevant to this website by other search engines, for example in the search column of search engine, input website domain name (as webscan.360.cn), obtain the all-links (as obtaining the links such as webscan.360.cn/news/, webscan.360.cn/task/) under this website.This search engine can be google search engine, Baidu's search engine.Certainly can understand, in an embodiment of the present invention the particular type of limit search engine not.
Subsequently, in step S103, the link of obtaining is carried out to vulnerability scanning.
The several ranks of vulnerability database sub server, catalogue, file, parameter and content of vulnerability scanning platform.Alternatively, in an embodiment of the present invention, can carry out to the link of obtaining the vulnerability scanning of directory level, by accelerating the vulnerability scanning speed of directory level, can reduce the leak testing time, reach the object of leak test optimization.
Subsequently, in step S105, the third party application of website is identified the vulnerability scanning matching for third party's application of website.
In an embodiment of the present invention, by accelerating the vulnerability scanning of third party's application, can accelerate the time of vulnerability scanning, be the most effective mode that adds fast scan speed and use the vulnerability scanning that leak coupling scans and more than three grades catalogue is not carried out third party's application of third party's application.
Alternatively, in an embodiment of the present invention, can to third party's application, carry out vulnerability scanning in the following ways, first obtain the title of third party's application; Then according to preset third party's application and the corresponding relation of vulnerability scanning method, carry out the vulnerability scanning of third party being applied to coupling.Preset third party's application can be recorded in table with the corresponding relation of vulnerability scanning method, sees table:
The title 1 of third party's application Vulnerability scanning method 1
The title 2 of third party's application Vulnerability scanning method 2
The title 3 of third party's application Vulnerability scanning method 3
Wherein, the step of obtaining the title of third party application comprises: the title of extracting third party application according to the copyright information of website; Or according to the MD5 (Message Digest Algorithm 5) that third party applies distinctive CSS (Cascading Style Sheet, Cascading Style Sheet) or JAVASCRIPT file, judge, identify that website used is the title of third party application; Or what according to the log file of third party's application, judge website use is the title of third party application.
Particularly, in an embodiment of the present invention, can obtain in the following ways the title of third party's application:
Mode one, according to Powered By, extract the title of third party application;
If extract less than, can judge according to the MD5 of the CSS of various third party applications or JAVASCRIPT file.As consistent with the MD5 coding of the aaa.js of Discuz in the MD5 coding of the abc.js on certain website, that be just identified as this website use is Discuz.
Mode two, according to some peculiar files of third party application, judge, if peculiar file can be log file.
When not existing the third party who matches to apply vulnerability scanning method, carry out step below: in step S107, judge whether third party's application is positioned at the above catalogue of N level, and wherein N is greater than 1 integer.
Alternatively, in an embodiment of the present invention, N level can be 3 grades, for example: webscan.360.cn/aa/bb/cc/dd/ is this is 3 grades of above catalogues.Certainly can understand, do not limit in an embodiment of the present invention the value of N.
If third party's application enters step S109 more than being positioned at N level catalogue, in step S109, do not carry out third party and apply vulnerability scanning.
If third party's application is positioned at below N level catalogue, enter step S111, in step S111, structure leak test URL (URL(uniform resource locator)) carries out leak test.
Alternatively, in step S111, by the URL grabbing, then construct leak test URL and go test, if the URL of structure meets certain leak judgment rule (as XSS, SQL inject etc.), represent to have found a leak.
According to embodiments of the invention, described website leak fast scanning method 100 can also comprise one or more optional step, to realize extra or additional function, yet these optional steps are not indispensable for realizing object of the present invention, website leak fast scanning method 100 can, in the situation that there is no these optional steps, be realized object of the present invention completely according to an embodiment of the invention.These optional steps are not shown in Figure 1, but priority between they and above steps is carried out and can according to following instruction, easily be drawn by those skilled in the art.It is pointed out that unless otherwise specified, these optional steps can be selected according to actual needs together with the execution sequence of above-mentioned steps.
Alternatively, in an embodiment of the present invention, before step S101, method 100 also comprises: step S113, step S115, step S117, step S119 and step S121.
In step S113, judgement for the scanning of the domain name of website whether for scanning first.Certainly can understand, do not limit in an embodiment of the present invention the concrete mode of judgement.
If the scanning of judging in step S113 for the domain name of website is not to scan first, enter step S115, in step S115, start spider or reptile program and obtain the all-links under this website.
If the scanning of judging in step S113 for the domain name of website is to scan first, enter step S117, in step S117, in judgement search chained library, whether the reptile interface of this website is available.
If in judgement search chained library, the reptile interface of this website can be used in step S117, enter step S119, in step S119, from the search chained library of search engine, obtain the all-links under this website.
Alternatively, in an embodiment of the present invention, reptile interface can directly obtain data at present from HBase cluster, input a website domain name (as webscan.360.cn), export this website under all-links (webscan.360.cn/news/, webscan.360.cn/task/ etc.).
If in judgement search chained library, the reptile interface of this website is unavailable in step S117, enter step S121, in step S121, start spider or reptile program is obtained the all-links under this website.
Use in an embodiment of the present invention the chain that obtains website from the chained library the inside of search to fetch original reptile program of replacing, sweep speed can improve more than 10 times, originally need spider or the website of reptile program about 30 minutes, can in 1~2 minute, complete scanning in an embodiment of the present invention.Because embodiments of the invention have reduced sweep time effectively, make to use for the first time the user of vulnerability scanning platform to experience very fast vulnerability scanning effect, user experiences and is greatly improved.
As shown in Figure 2, website leak rapid scanning equipment 200 can mainly comprise according to an embodiment of the invention: reptile is optimized module 210, scan module 230, leak test module 250.The annexation that should be appreciated that modules represented in Fig. 2 is only example, and those skilled in the art can adopt other annexation completely, as long as modules also can be realized function of the present invention under such annexation.
In this manual, the function of modules can by with specialized hardware or the hardware that can combine with suitable software to carry out processing realize.Such hardware or specialized hardware can comprise application-specific integrated circuit (ASIC) (ASIC), various other circuit, various processors etc.When being realized by processor, this function can be provided by single application specific processor, single shared processing device or a plurality of independently processor (wherein some may be shared).In addition, processor should not be understood to the hardware that special finger can executive software, but can impliedly comprise and be not limited to digital signal processor (DSP) hardware, be used for read-only memory (ROM), random access memory (RAM) and the non-volatile memory apparatus of storing software.
In an embodiment of the present invention, reptile is optimized module 210, and it is suitable for obtaining the all-links under this website from the search chained library of search engine; Alternatively, the various links that before having preserved in the search chained library of search engine, reptile or spider obtain, can therefrom extract the peer link of required website, and regain data without starting reptile.
In an embodiment of the present invention, scan module 230, it is suitable for described link of obtaining to carry out vulnerability scanning, the third party application of website is identified to the vulnerability scanning matching for third party's application of described website;
In an embodiment of the present invention, leak test module 250, it is suitable for judging that third party applies whether is positioned at the above catalogue of N level, if, do not carry out third party and apply vulnerability scanning, wherein N is greater than 1 integer, if described third party application is positioned at below N level catalogue, constructs leak test URL and carries out leak test.
Alternatively, in an embodiment of the present invention, equipment 200 also comprises:
Scan first judge module, whether it is suitable for judging to the scanning of the domain name of described website for scanning first, if not scanning and directly exit first;
Reptile interface judge module, its be suitable for scan first judge module judgement to the scanning of the domain name of described website when scanning first, whether the reptile interface of this website in chained library is searched in judgement available;
Common reptile module, it is suitable for reptile interface at reptile interface judge module judgement search engine when unavailable in described website, enables spider or reptile program is obtained the all-links under this website;
Wherein, when in reptile interface judge module judgement search chained library, the reptile interface of this website is available, described reptile is optimized module and obtain the all-links under this website from the search chained library of search engine.
Alternatively, in an embodiment of the present invention, described scan module 230 comprises:
Acquiring unit, it is suitable for obtaining the title of third party's application; And
Vulnerability scanning unit, it is suitable for, according to preset third party's application and the corresponding relation of vulnerability scanning method, carrying out the vulnerability scanning of third party being applied to coupling.
Alternatively, in an embodiment of the present invention, described acquiring unit obtains the title of third party's application in the following way:
According to the copyright information of website, extract the title of third party application; Or
The MD5 that applies distinctive CSS or JAVASCRIPT file according to third party judges, identifies that website used is the title of third party application; Or
What according to the log file of third party's application, judge website use is the title of third party application.
Although described in conjunction with the specific embodiments the present invention, be not to be defined in particular form described herein.But scope of the present invention is only limited by accompanying claim.In the claims, term " comprises " not getting rid of and has other parts or step.In addition, although each feature can be included in different claims, these features can be advantageously combined, and the content comprising in different claims does not mean that the combination of feature is infeasible and/or disadvantageous.In addition, single implication is not got rid of a plurality of.Therefore, the implication of " individual ", " first ", " second " etc. is not got rid of a plurality of.In addition, the Reference numeral in claim should not be interpreted as the restriction to scope.
The above is only the specific embodiment of the present invention; it should be noted that; for the person of ordinary skill of the art; do not departing under the prerequisite of spirit of the present invention; can make some improvement, modification and distortion, these improve, revise and distortion all should be considered as dropping in the application's protection range.

Claims (8)

1. a website leak fast scanning method, comprising:
From the search chained library of search engine, obtain the all-links under described website;
Described link of obtaining is carried out to vulnerability scanning;
Third party application to website is identified, the vulnerability scanning matching for third party's application of described website; And
More than judging whether third party's application is positioned at N level catalogue, if so, do not carry out third party and apply vulnerability scanning; If described third party's application is positioned at below N level catalogue, construct leak test uniform resource position mark URL and carry out leak test, wherein N is greater than 1 integer.
2. method according to claim 1, wherein,
Described from the search chained library of search engine, obtain the step of the all-links under this website before, also comprise:
Judgement for the scanning of the domain name of described website whether for scanning first, if, in judgement search chained library, whether the reptile interface of this website is available, if, from the search chained library of search engine, obtain the all-links under this website, otherwise, start spider or reptile program is obtained the all-links under this website.
3. method according to claim 1 and 2, wherein, the described application of the third party to website is identified, and the step of the vulnerability scanning matching for third party's application of described website comprises:
Obtain the title of third party's application; And
According to preset third party's application and the corresponding relation of vulnerability scanning method, carry out the vulnerability scanning of third party being applied to coupling.
4. method according to claim 3, wherein,
The step of the title of the described third party's of obtaining application comprises:
According to the copyright information of website, extract the title of third party application; Or
The MD5 that applies distinctive Cascading Style Sheet CSS or JavaScript file according to third party judges, identifies that website used is the title of third party application; Or
What according to the log file of third party's application, judge website use is the title of third party application.
5. a website leak rapid scanning equipment, it comprises:
Reptile is optimized module, and it is suitable for obtaining the all-links under this website from the search chained library of search engine;
Scan module, it is suitable for described link of obtaining to carry out vulnerability scanning, the third party application of website is identified to the vulnerability scanning matching for third party's application of described website;
Leak test module, it is suitable for judging that third party applies whether is positioned at the above catalogue of N level, if, do not carry out third party and apply vulnerability scanning, wherein N is greater than 1 integer, if described third party application is positioned at below N level catalogue, constructs leak test URL and carries out leak test.
6. equipment according to claim 5, described equipment also comprises:
Scan first judge module, whether it is suitable for judging to the scanning of the domain name of described website for scanning first, if not scanning and directly exit first;
Reptile interface judge module, its be suitable for scan first judge module judgement to the scanning of the domain name of described website when scanning first, whether the reptile interface of this website in chained library is searched in judgement available;
Common reptile module, it is suitable for reptile interface at reptile interface judge module judgement search engine when unavailable in described website, enables spider or reptile program is obtained the all-links under this website;
Wherein, when in reptile interface judge module judgement search chained library, the reptile interface of this website is available, described reptile is optimized module and obtain the all-links under this website from the search chained library of search engine.
7. according to the equipment described in claim 5 or 6, wherein,
Described scan module comprises:
Acquiring unit, it is suitable for obtaining the title of third party's application; And
Vulnerability scanning unit, it is suitable for, according to preset third party's application and the corresponding relation of vulnerability scanning method, carrying out the vulnerability scanning of third party being applied to coupling.
8. equipment according to claim 7, wherein,
Described acquiring unit obtains the title of third party's application in the following way:
According to the copyright information of website, extract the title of third party application; Or
The MD5 that applies distinctive Cascading Style Sheet CSS or JavaScript file according to third party judges, identifies that website used is the title of third party application; Or
What according to the log file of third party's application, judge website use is the title of third party application.
CN201310476173.6A 2013-10-12 2013-10-12 Website vulnerability rapid scanning method and device Active CN103685228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310476173.6A CN103685228B (en) 2013-10-12 2013-10-12 Website vulnerability rapid scanning method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310476173.6A CN103685228B (en) 2013-10-12 2013-10-12 Website vulnerability rapid scanning method and device

Publications (2)

Publication Number Publication Date
CN103685228A true CN103685228A (en) 2014-03-26
CN103685228B CN103685228B (en) 2017-05-17

Family

ID=50321544

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310476173.6A Active CN103685228B (en) 2013-10-12 2013-10-12 Website vulnerability rapid scanning method and device

Country Status (1)

Country Link
CN (1) CN103685228B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789926A (en) * 2016-11-28 2017-05-31 浪潮软件集团有限公司 Multi-process automatic SQL injection batch scanning tool and method
CN107135212A (en) * 2017-04-25 2017-09-05 武汉大学 Man-machine identifying device and method under a kind of Web environment of Behavior-based control difference
CN108733571A (en) * 2018-05-28 2018-11-02 北京五八信息技术有限公司 A kind of test method, device, equipment and computer readable storage medium
CN109074381A (en) * 2016-04-12 2018-12-21 微软技术许可有限责任公司 The domain name for social engineering is corrected using network search engines
CN109154966A (en) * 2016-06-23 2019-01-04 国际商业机器公司 Pregnable application program detection
WO2019127890A1 (en) * 2017-12-30 2019-07-04 平安科技(深圳)有限公司 Vulnerability scanning method, device, computer apparatus, and storage medium
CN110971599A (en) * 2019-11-29 2020-04-07 杭州迪普科技股份有限公司 Vulnerability scanning method and device
CN113987516A (en) * 2021-11-02 2022-01-28 湖北天融信网络安全技术有限公司 Vulnerability scanning method and device, storage medium and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040250115A1 (en) * 2003-04-21 2004-12-09 Trend Micro Incorporated. Self-contained mechanism for deploying and controlling data security services via a web browser platform
CN1866817A (en) * 2006-06-15 2006-11-22 北京华景中天信息技术有限公司 Website safety risk estimating method and system
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
CN102710642A (en) * 2012-06-01 2012-10-03 北京神州绿盟信息安全科技股份有限公司 Method and device for scanning system bug
CN102789502A (en) * 2012-07-17 2012-11-21 北京奇虎科技有限公司 Method and device for scanning website

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040250115A1 (en) * 2003-04-21 2004-12-09 Trend Micro Incorporated. Self-contained mechanism for deploying and controlling data security services via a web browser platform
CN1866817A (en) * 2006-06-15 2006-11-22 北京华景中天信息技术有限公司 Website safety risk estimating method and system
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
CN102710642A (en) * 2012-06-01 2012-10-03 北京神州绿盟信息安全科技股份有限公司 Method and device for scanning system bug
CN102789502A (en) * 2012-07-17 2012-11-21 北京奇虎科技有限公司 Method and device for scanning website

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孟祥雨: ""校园网中课件资源的爬取与检索"", 《中国优秀硕士学位论文全文数据库》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109074381A (en) * 2016-04-12 2018-12-21 微软技术许可有限责任公司 The domain name for social engineering is corrected using network search engines
CN109074381B (en) * 2016-04-12 2022-05-10 微软技术许可有限责任公司 Correcting domain names for social engineering using a web search engine
CN109154966A (en) * 2016-06-23 2019-01-04 国际商业机器公司 Pregnable application program detection
CN106789926A (en) * 2016-11-28 2017-05-31 浪潮软件集团有限公司 Multi-process automatic SQL injection batch scanning tool and method
CN107135212A (en) * 2017-04-25 2017-09-05 武汉大学 Man-machine identifying device and method under a kind of Web environment of Behavior-based control difference
WO2019127890A1 (en) * 2017-12-30 2019-07-04 平安科技(深圳)有限公司 Vulnerability scanning method, device, computer apparatus, and storage medium
CN108733571A (en) * 2018-05-28 2018-11-02 北京五八信息技术有限公司 A kind of test method, device, equipment and computer readable storage medium
CN110971599A (en) * 2019-11-29 2020-04-07 杭州迪普科技股份有限公司 Vulnerability scanning method and device
CN113987516A (en) * 2021-11-02 2022-01-28 湖北天融信网络安全技术有限公司 Vulnerability scanning method and device, storage medium and electronic equipment
CN113987516B (en) * 2021-11-02 2022-11-29 湖北天融信网络安全技术有限公司 Vulnerability scanning method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN103685228B (en) 2017-05-17

Similar Documents

Publication Publication Date Title
CN103685228A (en) Website vulnerability rapid scanning method and device
US8584233B1 (en) Providing malware-free web content to end users using dynamic templates
Niu et al. A Quantitative Study of Forum Spamming Using Context-based Analysis.
US20130282709A1 (en) Method and system for query suggestion
Wang et al. Detecting malicious landing pages in malware distribution networks
CN103617241B (en) Search information processing method, browser terminal and server
CN104408102B (en) For network hot word and the data processing method and device of the degree of association of object
Pantelaios et al. You've changed: Detecting malicious browser extensions through their update deltas
US11604843B2 (en) Method and system for generating phrase blacklist to prevent certain content from appearing in a search result in response to search queries
WO2015081792A1 (en) Method, device, and system for correlative and personalized extended search
WO2017080454A1 (en) Website access path aggregation method and device
CN103838881B (en) The method and device of self-defined search results pages
US20180060339A1 (en) Method and system for providing query suggestions
US10044754B2 (en) Polluting results of vulnerability scans
CN106033450A (en) Method and device for blocking advertisement, and browser
JP2011138248A (en) Search supporting program, search supporting device, and method for search supporting
CN105468981A (en) Vulnerability identification technology-based plugin safety scanning device and scanning method
KR101481910B1 (en) Apparatus and method for monitoring suspicious information in web page
KR101639869B1 (en) Program for detecting malignant code distributing network
US11080342B2 (en) Method and apparatus for web page content categorization
KR101803225B1 (en) System and Method for detecting malicious websites at high speed based multi-server, multi-docker
CN103914479A (en) Resource request matching method and device
CN110825976B (en) Website page detection method and device, electronic equipment and medium
US20170201532A1 (en) Black market collection method for tracing distributors of mobile malware
CN103064873A (en) Webpage quality data obtaining method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20161130

Address after: 100016 Jiuxianqiao Chaoyang District Beijing Road No. 10, building 15, floor 17, layer 1701-26, 3

Applicant after: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Applicant before: Qizhi software (Beijing) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088

Patentee after: Qianxin Technology Group Co.,Ltd.

Address before: No. 3, No. 10, No. 10, No. 10, Lu Jia, 1701-26, 17

Patentee before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address
TR01 Transfer of patent right

Effective date of registration: 20201225

Address after: 100044 2nd floor, building 1, yard 26, Xizhimenwai South Road, Xicheng District, Beijing

Patentee after: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc.

Patentee after: Qianxin Technology Group Co.,Ltd.

Address before: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088

Patentee before: Qianxin Technology Group Co.,Ltd.

TR01 Transfer of patent right
CP03 Change of name, title or address

Address after: 2nd Floor, Building 1, Yard 26, Xizhimenwai South Road, Xicheng District, Beijing, 100032

Patentee after: Qianxin Wangshen information technology (Beijing) Co.,Ltd.

Patentee after: Qianxin Technology Group Co.,Ltd.

Address before: 100044 2nd floor, building 1, yard 26, Xizhimenwai South Road, Xicheng District, Beijing

Patentee before: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc.

Patentee before: Qianxin Technology Group Co.,Ltd.

CP03 Change of name, title or address