CN109067789A - Web vulnerability scanning method, system based on linux system - Google Patents

Web vulnerability scanning method, system based on linux system Download PDF

Info

Publication number
CN109067789A
CN109067789A CN201811115299.XA CN201811115299A CN109067789A CN 109067789 A CN109067789 A CN 109067789A CN 201811115299 A CN201811115299 A CN 201811115299A CN 109067789 A CN109067789 A CN 109067789A
Authority
CN
China
Prior art keywords
vulnerability scanning
client
plug
unit
web
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811115299.XA
Other languages
Chinese (zh)
Inventor
刘浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201811115299.XA priority Critical patent/CN109067789A/en
Publication of CN109067789A publication Critical patent/CN109067789A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)

Abstract

A kind of Web vulnerability scanning method based on linux system provided by the present invention, comprising: to client transmission goal systems to setup parameter;It include IP address and port numbers to setup parameter;It is treated after setup parameter set in client, receives the scan instruction of client;Vulnerability scanning plug-in unit is called to carry out vulnerability scanning to goal systems according to scan instruction.Storing vulnerability scanning in the form of library, that is, plug-in unit is formed, vulnerability scanning process is separated from system, making it not influences normal system operation.The implementing result of plug-in unit has expanded types of databases detection information, can also increase all kinds of special information on this basis, carries out the vulnerability scanning of more deep target Web system, is updated with discovery, more vulnerability informations.The application also provides a kind of Web vulnerability scanning system based on linux system, a kind of computer readable storage medium and a kind of server, has above-mentioned beneficial effect.

Description

Web vulnerability scanning method, system based on linux system
Technical field
The present invention relates to network safety filed, in particular to a kind of Web vulnerability scanning method based on linux system is System, a kind of computer readable storage medium and a kind of server.
Background technique
With the fast development of internet, China's public internet number of users sustainable growth.While network Development, As an operating system and a social public environment, security threat faced and hiding is also more and more multiple for internet It is miscellaneous, it is increasingly severe.According in recent years attack statistics in it is not difficult to find that by Web loophole carry out attack by Year rapidly increases.The major way and means at network hole attack have been attacked by Web loophole.
But existing vulnerability scanning will occupy very big Installed System Memory, greatly influence running efficiency of system.Therefore such as The problem of influence that reduction runs system while where scanning Web loophole is those skilled in the art's urgent need to resolve.
Summary of the invention
The object of the present invention is to provide a kind of Web vulnerability scanning method, system based on linux system, a kind of computer Readable storage medium storing program for executing and a kind of server solve the problems, such as that the occupancy of existing vulnerability scanning process for system is big.
In order to solve the above technical problems, the present invention provides a kind of Web vulnerability scanning method based on linux system, specifically Technical solution is as follows:
To client transmission goal systems to setup parameter;Described to setup parameter includes IP address and port numbers;
The client to described after setup parameter is set, receive the scan instruction of the client;
Vulnerability scanning plug-in unit is called to carry out vulnerability scanning to the goal systems according to the scan instruction.
Wherein, carrying out vulnerability scanning to the goal systems according to scan instruction calling vulnerability scanning plug-in unit includes:
Plug-in unit is called to call inventory according to the scan instruction;
The first preset order on inventory is called to call vulnerability scanning plug-in unit to the target system one by one according to the plug-in unit System carries out vulnerability scanning.
Wherein, when there are new loophole, further includes:
The new loophole and corresponding scan method are increased into detection data library, and first preset order is updated For the second preset order.
Wherein, after calling vulnerability scanning plug-in unit to carry out vulnerability scanning to the goal systems according to the scan instruction, Further include:
Vulnerability scanning result is back to the client, is swept so that the client shows and/or save the loophole Retouch result.
The application also provides a kind of Web vulnerability scanning system based on linux system, comprising:
Sending module, for client send goal systems to setup parameter;Described to setup parameter includes IP Location and port numbers;
Receiving module, for the client to described after setup parameter is set, receive the client Scan instruction;
Scan module is swept for calling vulnerability scanning plug-in unit to carry out loophole to the goal systems according to the scan instruction It retouches.
Wherein, the scan module includes:
Call unit, for calling plug-in unit to call inventory according to the scan instruction;
Scanning element, for calling the first preset order on inventory to call vulnerability scanning plug-in unit one by one according to the plug-in unit Vulnerability scanning is carried out to the goal systems.
Wherein, when there are new loophole, further includes:
Update module, for the new loophole and corresponding scan method to be increased to detection data library, and by described One preset order is updated to the second preset order.
Wherein, further includes:
Return module, for vulnerability scanning result to be back to the client, so that the client is shown and/or is protected Deposit the vulnerability scanning result.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer journey The step of Web vulnerability scanning method as described above is realized when sequence is executed by processor.
The application also provides a kind of server, including memory and processor, has computer program in the memory, The processor realizes the step of Web vulnerability scanning method as described above when calling the computer program in the memory.
A kind of Web vulnerability scanning method based on linux system provided by the present invention, comprising: send mesh to client Mark system to setup parameter;Described to setup parameter includes IP address and port numbers;In the client to described wait set After parameter is set, the scan instruction of the client is received;Call vulnerability scanning plug-in unit to institute according to the scan instruction It states goal systems and carries out vulnerability scanning.
The application forms plug-in unit, by vulnerability scanning process storing vulnerability scanning in the form of library It is separated from system, making it not influences normal system operation.The implementing result of plug-in unit has expanded types of databases detection Information can also increase all kinds of special information on this basis, carry out the vulnerability scanning of more deep target Web system, With enhanced scalability, updated with discovery, more vulnerability informations.The application also provides a kind of Web leakage based on linux system Hole scanning system, a kind of computer readable storage medium and a kind of server have above-mentioned beneficial effect, and details are not described herein again.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the Web vulnerability scanning method based on linux system provided by the embodiment of the present invention;
Fig. 2 is a kind of Web vulnerability scanning system structural representation based on linux system provided by the embodiment of the present invention Figure.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Referring to FIG. 1, Fig. 1 is a kind of Web vulnerability scanning method based on linux system provided by the embodiment of the present invention Flow chart, which includes:
S101: to client transmission goal systems to setup parameter;Described to setup parameter includes IP address and port Number;
There are two main classes for Web vulnerability scanning method: acquisition of information and simulation attack.Acquisition of information be exactly by with target master The Http serve port of machine TCP/IP sends connection request, records the response of destination host.By in destination host response message Status code and returned data are matched with Http protocol-related conditions code and predefined return information, are considered as if matching condition Loophole exists.Simulation attack is exactly the method attacked by using analog hacker, is carried out to destination host Web system aggressive Security scan, for example certification is attacked with authorization, the attack of support file, is attacked and is utilized comprising file attack, SQL injection and compile Code technological attack etc. checks goal systems known bugs that may be present item by item, to find the loophole of system. Long-range dictionary attack is also one kind that attack is simulated in vulnerability scanning, and principle differs larger with other attacks, if success attack, The user name and password for logging in target host systems can be directly obtained.
This step is intended to from server-side first to client transmission goal systems to setup parameter, should be to setup parameter at least IP address and port numbers including goal systems, can also have other parameters certainly, be not limited thereto.
In the present embodiment, client refers to web interface, its advantage is that can anywhere, any environment using visitor Family end carries out the control work of parameter setting and system with simple graphic interface.
Preferably, the client in the application can use B/S structure, i.e. Browser/Server (browser/service Device) structure, B/S structure it is more more convenient than traditional C/S structure and and it is unrelated with platform, user by Web browser set to Setup parameter submits to server end, can control server end be scanned work.
Server end is usually attached with multi-user, therefore to carry out multiple threads.In the process, it usually also needs The connection verification process that first carry out client and server, i.e., confirmed by identity of the server to client.It is right at this It is not especially limited in connection verification process.By taking single user as an example, in carrying out single user processing, when user logs in, detection Server authenticates the username and password of user, judges whether user has access right.
S102: the client to described after setup parameter is set, receive the scan instruction of the client;
This step is the scan instruction that server receives client in fact.It should be noted that server can connect simultaneously The scan instruction for receiving multiple client, that is, meet the scanning demand of multiple client.Multiple threads mode can be used at this time The scan instruction of different clients is responded.Herein for specifically which kind of multiple threads mode being used to be not construed as limiting.
Preferably, a kind of multiple threads mode is provided herein, i.e., PERL development language under Linux platform and is concurrently taken The model of business device.
The thought of concurrent server is that the request of each client is not handled directly by server, but by server Corresponding subprocess is created to be handled.For each subprocess, it includes not only that client, which can set its scanning range, One destination address equally creates corresponding subprocess (i.e. second level process) by server to handle, to improve the scanning of system Speed.I and II process processing function is completed using the fork function under Linux.
On the basis of concurrent server thought, due to the efficiency of PERL itself, to further increase vulnerability scanning The performance of system carries out port scan first with tool NMAP highly developed at this stage to goal systems, to obtain Open port carries out further port scan on this basis, to judge whether to provide Web clothes on this port Business saves the time for finding open port, improves the efficiency of Web vulnerability scanning.
Client is mentioned in S101 to usually require to be attached certification with server, and after connection certification passes through, client First detection service device is held to send workable basic detection information to client.Client receives these information of server Afterwards, various sweep parameters are selected and filled according to specific requirement, or use default parameters, are then returned to server End.At this point, server end establishes new process, starts a new Hole Detection task, goal systems is scanned.
S103: vulnerability scanning plug-in unit is called to carry out vulnerability scanning to the goal systems according to the scan instruction.
This step is intended to the scan instruction for calling vulnerability scanning plug-in unit with customer in response end.It is understood that the application In all vulnerability scanning plug-in units can be stored in a database, i.e. detection data library.It saves all kinds of Web loopholes known Infiltrative detection data, that is, attack code or acquisition of information code, such as SQL injection attack, cross-site scripting attack, session Attack or input verifying encoded information etc., send detection data to target one by one, by the way that return information " is returned with preset Letter in reply breath " and status code are matched, and then obtain the scanning information of target return system.
The core of this vulnerability scanning system is exactly characteristic information data library, and characteristic information data library saves long-range Web system The acquisition of all kinds of Web hidden danger that may be present of uniting and loophole or attack information or code.By sending this number to long-range Web system The safety of target Web system is obtained according to the data in library.It is special in view of factors such as the general character of information and individual character, convenience Sign database information is broadly divided into following a few classes:
(1) Web system software version information database: this type of information is to detect the version of current Web system corresponding software Hidden danger and its vulnerability information and Web system corresponding software version up-to-date information, and provide relevant prompt.
(2) Web system authorization message: this type of information is to detect the authorization conditions and leakage of current Web corresponding system resource Hole information.
(3) loophole control measurement information database: such database is most important information database, includes all kinds of Web services Various hidden danger present in device and vulnerability detection information.Specifically it is divided into following major class: certification is attacked, authorization is attacked, Identify that " support " file, identification are compiled comprising file, catalogue attack, identification mistake, general input verifying, source code leakage, URL Code, Unicode coding, Base64 coding, identification requesting method, SQL injection, session attack, directory traversal are attacked and across station Point script attack etc..
The present embodiment forms plug-in unit, by vulnerability scanning mistake storing vulnerability scanning in the form of library Journey is separated from system, and making it not influences normal system operation.The implementing result of plug-in unit has expanded types of databases spy Measurement information can also increase all kinds of special information on this basis, and the loophole for carrying out more deep target Web system is swept It retouches, there is enhanced scalability, updated with discovery, more vulnerability informations.The present embodiment uses B/S structure to make user's operation side Just, scanning result understands, is detailed, can largely ensure Web system safety.
Based on the above embodiment, as preferred embodiment, vulnerability scanning result can also be back to described by server Client, so that the client shows and/or save the vulnerability scanning result.In other words, in detection process, Yong Huke With by client sets itself, whether real-time display server-side scanning mode information and vulnerability scanning are as a result, and in client Whether vulnerability scanning is saved as a result, being controlled in real time convenient for user scan task, to formulate corresponding security strategy. It should be noted that even if vulnerability scanning result is sent to client by server, if show or save in client By user depending on the setting of client.
Based on the above embodiment, as preferred embodiment, more specifically, this step can be subdivided into two steps: root Plug-in unit is called to call inventory according to the scan instruction;The first preset order on inventory is called to call leakage one by one according to the plug-in unit It scans plug-in unit and vulnerability scanning is carried out to the goal systems in hole.
When the present embodiment is intended to illustrate that plug-in unit is called to carry out vulnerability scanning, not adjusted at random from detection data library With, but a plug-in unit can be set in detection data library and call inventory.Plug-in unit is called and is inserted on inventory including need to call Part and corresponding calling sequence namely the first preset order.The specific order of the first preset order is not construed as limiting herein, is had Body sequence should be configured by those skilled in the art, such as can be scanned sequence according to the significance level of loophole.It needs Illustrate, when carrying out vulnerability scanning, calls inventory to call one by one according to the plug-in unit.In other words, setting first is preset suitable The purpose of sequence is ensure that vulnerability scanning comprehensive, avoids loophole " forgettings " occurs scanning phenomenon.
Based on the above embodiment, as preferred embodiment, when there are new loophole, further includes:
The new loophole and corresponding scan method are increased into detection data library, and first preset order is updated For the second preset order.
When detection data library increases new loophole and corresponding scan method, also need to call plug-in unit described above Inventory is updated, i.e., the first preset order is updated to the second preset order.Likewise, the second preset order and first is preset The purpose of sequence is the integrality for guaranteeing vulnerability scanning, it is ensured that the omission phenomenon of plug-in unit does not occur.So herein for second Preset order is equally not construed as limiting, and can be arranged accordingly by those skilled in the art according to the significance level of loophole.
The present embodiment is intended to add it in the form of plug-in unit when finding new its i.e. corresponding scanning mode of loophole Detection data library is added to, calls inventory to be updated in detection data library and plug-in unit, realizes the update to vulnerability scanning plug-in unit.
Based on the above embodiment, as preferred embodiment, call vulnerability scanning plug-in unit to the target system in S103 System carries out vulnerability scanning and carries out more specific description.
Preferably, infiltrative detection method can be used.Existing frequently-used Http agreement carries out web data transmission, Http Agreement is a kind of request/response type agreement on TCP/IP.Most Http data transmission are by request server Certain resource start, by some intermediaries on network, such as agency, gateway reach server, and then server process is asked It asks and sends response back to.But Http1.0 not fully supports the skills such as each layer proxy, buffering, lasting connection and fictitious host computer Art.Infiltrative detection method mainly passes through certain information in change Http request packet, believes from the response of goal systems Status information and related content are obtained in breath packet to judge input or the software error or some other with confidence of goal systems Breath, it requires with customized Http request packet.
On this basis, it is communicated by the library Libwhisker with Http.Libwhisker is a comprehensive API, be by The database that functional module that is some different and interacting with web application is constituted, it has the characteristics that as follows:
It can be communicated with Http0.9,1.0 and 1.1;It can establish lasting connection;It can effectively support to act on behalf of;Branch Hold Anti-IDS technology;Support SSL;Support Basic and NTLM certification.
So system can be communicated by the library Libwhisker with Http, by Libwhisker come customized Http agreement Packet and the corresponding support of offer.
A kind of Web vulnerability scanning system based on linux system provided in an embodiment of the present invention is introduced below, under The Web vulnerability scanning system of text description can correspond to each other reference with above-described Web vulnerability scanning method.
Referring to fig. 2, Fig. 2 is a kind of Web vulnerability scanning system knot based on linux system provided by the embodiment of the present invention Structure schematic diagram, the application also provide a kind of Web vulnerability scanning system based on linux system, comprising:
Sending module 100, for client send goal systems to setup parameter;Described to setup parameter includes IP Address and port numbers;
Receiving module 200, for the client to described after setup parameter is set, receive the client Scan instruction;
Scan module 300, for calling vulnerability scanning plug-in unit to leak the goal systems according to the scan instruction Hole scanning.
Based on the above embodiment, as preferred embodiment, the scan module 300 includes:
Call unit, for calling plug-in unit to call inventory according to the scan instruction;
Scanning element, for calling the first preset order on inventory to call vulnerability scanning plug-in unit one by one according to the plug-in unit Vulnerability scanning is carried out to the goal systems.
Based on the above embodiment, as preferred embodiment, when there are new loophole, further includes:
Update module, for the new loophole and corresponding scan method to be increased to detection data library, and by described One preset order is updated to the second preset order.
Based on the above embodiment, as preferred embodiment, further includes:
Return module, for vulnerability scanning result to be back to the client, so that the client is shown and/or is protected Deposit the vulnerability scanning result.
Present invention also provides a kind of computer readable storage mediums, have computer program thereon, the computer program It is performed and step provided by above-described embodiment may be implemented.The storage medium may include: USB flash disk, mobile hard disk, read-only deposit Reservoir (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or The various media that can store program code such as CD.
Present invention also provides a kind of servers, may include memory and processor, have calculating in the memory When the processor calls the computer program in the memory, step provided by above-described embodiment is may be implemented in machine program Suddenly.Certain server can also include various network interfaces, the components such as power supply.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
It is described in detail above to provided by the present invention.Specific case used herein is to the principle of the present invention And embodiment is expounded, the above embodiments are only used to help understand, and method and its core of the invention is thought Think.It should be pointed out that for those skilled in the art, without departing from the principle of the present invention, may be used also With several improvements and modifications are made to the present invention, these improvements and modifications also fall within the scope of protection of the claims of the present invention.

Claims (10)

1. a kind of Web vulnerability scanning method based on linux system characterized by comprising
To client transmission goal systems to setup parameter;Described to setup parameter includes IP address and port numbers;
The client to described after setup parameter is set, receive the scan instruction of the client;
Vulnerability scanning plug-in unit is called to carry out vulnerability scanning to the goal systems according to the scan instruction.
2. Web vulnerability scanning method according to claim 1, which is characterized in that call loophole according to the scan instruction Scanning plug-in unit carries out vulnerability scanning to the goal systems
Plug-in unit is called to call inventory according to the scan instruction;
According to the plug-in unit call inventory on the first preset order call one by one vulnerability scanning plug-in unit to the goal systems into Row vulnerability scanning.
3. Web vulnerability scanning method according to claim 2, which is characterized in that when there are new loophole, further includes:
The new loophole and corresponding scan method are increased into detection data library, and first preset order is updated to Two preset orders.
4. Web vulnerability scanning method according to claim 1, which is characterized in that call loophole according to the scan instruction After plug-in unit is scanned to goal systems progress vulnerability scanning, further includes:
Vulnerability scanning result is back to the client, so that the client shows and/or save the vulnerability scanning knot Fruit.
5. a kind of Web vulnerability scanning system based on linux system characterized by comprising
Sending module, for client send goal systems to setup parameter;It is described to setup parameter include IP address and Port numbers;
Receiving module, for the client to described after setup parameter is set, receive the scanning of the client Instruction;
Scan module, for calling vulnerability scanning plug-in unit to carry out vulnerability scanning to the goal systems according to the scan instruction.
6. Web vulnerability scanning system according to claim 5, which is characterized in that the scan module includes:
Call unit, for calling plug-in unit to call inventory according to the scan instruction;
Scanning element, for calling the first preset order on inventory to call vulnerability scanning plug-in unit to institute one by one according to the plug-in unit It states goal systems and carries out vulnerability scanning.
7. Web vulnerability scanning system according to claim 6, which is characterized in that when there are new loophole, further includes:
Update module, for the new loophole and corresponding scan method to be increased to detection data library, and it is pre- by described first If sequential update is the second preset order.
8. Web vulnerability scanning system according to claim 5, which is characterized in that further include:
Return module, for vulnerability scanning result to be back to the client, so that the client shows and/or save institute State vulnerability scanning result.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of processor realizes Web vulnerability scanning method according to any one of claims 1-4 when executing.
10. a kind of server, which is characterized in that including memory and processor, have computer program, institute in the memory It states and realizes that Web loophole according to any one of claims 1-4 is swept when processor calls the computer program in the memory The step of retouching method.
CN201811115299.XA 2018-09-25 2018-09-25 Web vulnerability scanning method, system based on linux system Pending CN109067789A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811115299.XA CN109067789A (en) 2018-09-25 2018-09-25 Web vulnerability scanning method, system based on linux system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811115299.XA CN109067789A (en) 2018-09-25 2018-09-25 Web vulnerability scanning method, system based on linux system

Publications (1)

Publication Number Publication Date
CN109067789A true CN109067789A (en) 2018-12-21

Family

ID=64765653

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811115299.XA Pending CN109067789A (en) 2018-09-25 2018-09-25 Web vulnerability scanning method, system based on linux system

Country Status (1)

Country Link
CN (1) CN109067789A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109922081A (en) * 2019-04-02 2019-06-21 全知科技(杭州)有限责任公司 A kind of long connection data analysing method of TCP flow
CN109948343A (en) * 2019-03-13 2019-06-28 杭州数梦工场科技有限公司 Leak detection method, Hole Detection device and computer readable storage medium
CN110290129A (en) * 2019-06-20 2019-09-27 深圳前海微众银行股份有限公司 A kind of method and device of Web Hole Detection
CN110460571A (en) * 2019-07-05 2019-11-15 深圳壹账通智能科技有限公司 Operation system loophole processing method, device, computer equipment and storage medium
CN111680303A (en) * 2020-06-10 2020-09-18 北京天融信网络安全技术有限公司 Vulnerability scanning method and device, storage medium and electronic equipment
CN111723374A (en) * 2020-06-05 2020-09-29 绿盟科技集团股份有限公司 Vulnerability scanning method and device
CN112182587A (en) * 2020-09-30 2021-01-05 中南大学 Web vulnerability scanning method, system, device, storage medium and computer equipment
CN112632559A (en) * 2020-12-24 2021-04-09 北京天融信网络安全技术有限公司 Vulnerability automatic verification method, device, equipment and storage medium
CN112671728A (en) * 2020-12-14 2021-04-16 中科曙光国际信息产业有限公司 Network access request acquisition method and device, computer equipment and storage medium
CN113420303A (en) * 2021-07-14 2021-09-21 广东电网有限责任公司广州供电局 Port scanning-based substation host security vulnerability detection method and system
CN114996716A (en) * 2022-06-15 2022-09-02 中国电信股份有限公司 Vulnerability processing method and device based on plug-in, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8701172B2 (en) * 2008-08-13 2014-04-15 Apple Inc. System and method for facilitating user authentication of web page content
CN105871845A (en) * 2016-03-31 2016-08-17 深圳市深信服电子科技有限公司 Method and device for detecting Web vulnerability scanning behavior
CN108063755A (en) * 2017-11-08 2018-05-22 携程旅游信息技术(上海)有限公司 vulnerability scanning method, system, storage medium and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8701172B2 (en) * 2008-08-13 2014-04-15 Apple Inc. System and method for facilitating user authentication of web page content
CN105871845A (en) * 2016-03-31 2016-08-17 深圳市深信服电子科技有限公司 Method and device for detecting Web vulnerability scanning behavior
CN108063755A (en) * 2017-11-08 2018-05-22 携程旅游信息技术(上海)有限公司 vulnerability scanning method, system, storage medium and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
齐建臣等: "一种基于渗透性测试的Web漏洞扫描系统设计与实现", 《现代电子技术》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948343A (en) * 2019-03-13 2019-06-28 杭州数梦工场科技有限公司 Leak detection method, Hole Detection device and computer readable storage medium
CN109922081A (en) * 2019-04-02 2019-06-21 全知科技(杭州)有限责任公司 A kind of long connection data analysing method of TCP flow
CN109922081B (en) * 2019-04-02 2021-06-25 全知科技(杭州)有限责任公司 TCP stream length connection data analysis method
CN110290129A (en) * 2019-06-20 2019-09-27 深圳前海微众银行股份有限公司 A kind of method and device of Web Hole Detection
CN110460571A (en) * 2019-07-05 2019-11-15 深圳壹账通智能科技有限公司 Operation system loophole processing method, device, computer equipment and storage medium
CN110460571B (en) * 2019-07-05 2022-11-04 深圳壹账通智能科技有限公司 Business system vulnerability processing method and device, computer equipment and storage medium
WO2021003982A1 (en) * 2019-07-05 2021-01-14 深圳壹账通智能科技有限公司 Service system vulnerability processing method and apparatus, computer device, and storage medium
CN111723374B (en) * 2020-06-05 2024-06-11 绿盟科技集团股份有限公司 Vulnerability scanning method and device
CN111723374A (en) * 2020-06-05 2020-09-29 绿盟科技集团股份有限公司 Vulnerability scanning method and device
CN111680303A (en) * 2020-06-10 2020-09-18 北京天融信网络安全技术有限公司 Vulnerability scanning method and device, storage medium and electronic equipment
CN111680303B (en) * 2020-06-10 2023-02-07 北京天融信网络安全技术有限公司 Vulnerability scanning method and device, storage medium and electronic equipment
CN112182587A (en) * 2020-09-30 2021-01-05 中南大学 Web vulnerability scanning method, system, device, storage medium and computer equipment
CN112671728A (en) * 2020-12-14 2021-04-16 中科曙光国际信息产业有限公司 Network access request acquisition method and device, computer equipment and storage medium
CN112671728B (en) * 2020-12-14 2023-01-03 中科曙光国际信息产业有限公司 Network access request acquisition method and device, computer equipment and storage medium
CN112632559A (en) * 2020-12-24 2021-04-09 北京天融信网络安全技术有限公司 Vulnerability automatic verification method, device, equipment and storage medium
CN113420303A (en) * 2021-07-14 2021-09-21 广东电网有限责任公司广州供电局 Port scanning-based substation host security vulnerability detection method and system
CN114996716A (en) * 2022-06-15 2022-09-02 中国电信股份有限公司 Vulnerability processing method and device based on plug-in, computer equipment and storage medium
CN114996716B (en) * 2022-06-15 2024-06-28 中国电信股份有限公司 Plug-in-based vulnerability processing method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109067789A (en) Web vulnerability scanning method, system based on linux system
US10505929B2 (en) Management and authentication in hosted directory service
US10015157B2 (en) Multi-domain applications with authorization and authentication in cloud environment
KR100630212B1 (en) An apparatus and method for determining a program neighborhood for a client node in a client-server network
US9002985B2 (en) Branded and comarketed domain-based thick client system
US20090313363A1 (en) Hosting a remote computer in a hosting data center
US20090313364A1 (en) Direct domain software and file access computer system
US20090313321A1 (en) Branded and comarketed domain-based thin client system
CN111786969B (en) Single sign-on method, device and system
CN101582856B (en) Session setup method of portal server and BAS (broadband access server) device and system thereof
US9426171B1 (en) Detecting network attacks based on network records
CN109873805A (en) Cloud desktop login method, device, equipment and storage medium based on cloud security
CN110032842B (en) Method and system for simultaneously supporting single sign-on and third party sign-on
US9473516B1 (en) Detecting network attacks based on a hash
US11995176B2 (en) Platform for generation of passwords and/or email addresses
CN105022939B (en) Information Authentication method and device
CN109819033A (en) A kind of resource file loading method and system
CN108347428A (en) Accreditation System, the method and apparatus of application program based on block chain
CN110232265A (en) Dual-identity authentication method, apparatus and system
CN109274705A (en) Service providing method, apparatus and system based on user identity
CN112039873A (en) Method for accessing business system by single sign-on
EP3488589A1 (en) Login proxy for third-party applications
US9894057B2 (en) Method and system for managing secure custom domains
CN113194099B (en) Data proxy method and proxy server
CN108683651B (en) Single sign-on method, server and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181221