Armo php : a web application vulnerability scanning platform for php armophp一個(gè)用針對(duì)phpweb應(yīng)用程式的安全漏洞檢查平臺(tái)
And the function of gathering vulnerability information is often provided by network vulnerability scanning tools 而對(duì)目標(biāo)系統(tǒng)漏洞信息的獲取,目前主要是通過(guò)網(wǎng)絡(luò)漏洞掃描工具實(shí)現(xiàn)的。
vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of lotus domino 漏洞攻擊掃描有助于識(shí)別操作系統(tǒng)或lotusdomino配置中潛在的安全漏洞。
In the end, this article describes the design and implementation of a network vulnerability scanning system, which names nvs ( network vulnerability scanner ) 最后本文設(shè)計(jì)并實(shí)現(xiàn)了一個(gè)采用木馬體系結(jié)構(gòu)的、面向攻擊的網(wǎng)絡(luò)漏洞掃描系統(tǒng)nvs(networkvulnerabilityscanner)。
Then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking . after that, the article pays attention to the attacking technology on vulnerability 然后又進(jìn)一步研究了漏洞攻擊技術(shù),并分析在實(shí)施網(wǎng)絡(luò)攻擊過(guò)程中,執(zhí)行網(wǎng)絡(luò)漏洞掃描所面臨的困難。
Then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking . after that, the article pays attention to the attacking technology on vulnerability 然后又進(jìn)一步研究了漏洞攻擊技術(shù),并分析在實(shí)施網(wǎng)絡(luò)攻擊過(guò)程中,執(zhí)行網(wǎng)絡(luò)漏洞掃描所面臨的困難。
And nvs consists of two parts : nvs console and nvs sensor . nvs sensor runs as a trojan horse on an innocent host . an attacker uses nvs console to control nvs sensor to perform vulnerability scanning nvs執(zhí)行端內(nèi)核是以木馬形式植入第三方“無(wú)辜”主機(jī),而本地攻擊者使用nvs控制端控制遠(yuǎn)程執(zhí)行端,對(duì)目標(biāo)系統(tǒng)執(zhí)行網(wǎng)絡(luò)漏洞掃描。
In the risk management system, the risk assessment is the basic and first indispensable step . the risk assessment deals with the results of vulnerability scan and threat recognition with some special methods 在風(fēng)險(xiǎn)管理中,風(fēng)險(xiǎn)評(píng)估是最基本的,它根據(jù)漏洞掃描及威脅識(shí)別的結(jié)果采用適當(dāng)?shù)娘L(fēng)險(xiǎn)評(píng)估方法對(duì)被評(píng)估系統(tǒng)的安全性做出定量的評(píng)判。
The article primarily describes the implementation of the route detection module of the internet topology sub-system, the internet vulnerabilities scanning sub-system, and the remote control module of attack and control sub-system in the circumstances of windows 2000 and the microsoft visual c + + 6.0 本文圍繞上述目標(biāo)和實(shí)現(xiàn)方法,介紹了網(wǎng)絡(luò)拓?fù)浒l(fā)現(xiàn)子系統(tǒng)中的目標(biāo)網(wǎng)絡(luò)尋徑子模塊,掃描子系統(tǒng),攻擊及控制子系統(tǒng)中的遠(yuǎn)程控制子模塊在windows2000professional平臺(tái)上、microsoftvisualc++6.0環(huán)境下的實(shí)現(xiàn)。
The risk management contains lots of security technology including vulnerability scan, threat recognition, risk assessment and response technology . this paper presents a risk management platform based on the related technologies and the risk management models . the risk management platform consists of three layers including information collect layer, information assess layer and security response layer 本文通過(guò)對(duì)風(fēng)險(xiǎn)管理相關(guān)技術(shù)以及目前存在的風(fēng)險(xiǎn)管理模型的研究,設(shè)計(jì)了風(fēng)險(xiǎn)管理平臺(tái),將風(fēng)險(xiǎn)管理平臺(tái)劃分為三個(gè)層次分別為信息收集層、信息處理層和安全響應(yīng)層,完成從系統(tǒng)安全信息收集、安全信息處理到最后的安全響應(yīng)措施一系列步驟。