Web漏洞扫描器能帮助我们修补漏洞吗?
Can web vulnerability scanners help you remediate the vulnerability?
最好的web漏洞扫描器应该是什么样的?
如何获知哪一款web漏洞扫描器适合需要?
How can I find out which web vulnerability scanner best suites my needs?
什么是漏洞扫描器?
部署工控漏洞扫描系统,及时发现工控系统漏洞。
Deployment of industrial vulnerability scanning system, industrial system vulnerabilities found in a timely manner.
叙述了CGI的安全性及CGI漏洞扫描的原理。
在网络安全中漏洞扫描起着发现安全隐患的作用。
In network security, the vulnerability scanner will find the hidden vulnerability.
网络漏洞扫描方法分为:直接测试、推断、认证测试。
Hole scanning is divided into directly test, concluding and authentication test.
漏洞扫描是发现与软件相关的问题的强大工具,比如配置和补丁问题。
Vulnerability scanning can be a very powerful tool in the ongoing struggle to uncover problems relating to software, such as configuration and patching issues.
补丁文件定位是实现主机漏洞扫描及补丁推送系统的关键。
The location of patch files is important for realizing the host-based vulnerability scanner and patch-pushed system(HVSPS).
对于正在评估web漏洞扫描器的人应该读读这篇访谈文章。
A must read interview for anyone who is interested in evaluating web vulnerability scanners.
其次,你应该检查web漏洞扫描器发现了多少实际存在的漏洞。
Secondly, you should also check how many actual vulnerabilities the web vulnerability scanner discovered.
很多软件公司开发出web漏洞扫描器,然后给你试用版的许可证。
Most of the software companies developing web vulnerability scanners will willingly give you evaluation licenses.
在此基础之上,本文提出了一个基于木马体系结构的漏洞扫描模型。
NVS is based on Trojan horse architecture and facing to network attack.
漏洞扫描技术是一门新兴的技术,它从另一个角度解决网络安全问题。
Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.
你也能在互联网上找到很多关于web漏洞扫描器的信息和他们的性能指标。
You can also find a lot of information on the Internet about web vulnerability scanners and their performance.
而对目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。
Then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking.
那么,漏洞扫描的目的是什么? Metasploit如何进行漏洞扫描?
So, what's the purpose of vulnerability scanning, and how does Metasploit fit in?
Nessus漏洞扫描器提供几个重要的扫描特性,比如高速发现、资产概况和漏洞分析。
The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.
Nessus漏洞扫描器提供几个重要的扫描特性,比如高速探测、资产分析和漏洞分析。
The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.
最后,作为对网络漏洞扫描技术的补充,简要介绍和讨论了系统脆弱性分析技术。
Finally, as a complement to the leak scan technology, vulnerability analysis technology is also introduced and discussed briefly in the paper.
在分析和归纳网络漏洞扫描系统功能的基础上,构建了其对应的CIM通用模型。
Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.
简言之,漏洞扫描器是专门设计用于查找和暴露应用程序和操作系统中的弱点的软件。
Simply put, a vulnerability scanner is a piece of software specifically designed to search for and reveal weaknesses in an application or operating system.
目前,主机安全检测方式主要有利用自动化漏洞扫描工具进行检测和人工检测两种。
At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
Web漏洞扫描器是功能复杂的软件,用它去发现站点中的漏洞的过程是漫长而艰辛的。
A web vulnerability scanner is a complex piece of software, and discovering vulnerabilities in a website can be a difficult and long process.
Metasploit比常规漏洞扫描器更进一步:它支持您研究自己的攻击和交付机制。
Metasploit goes a step beyond regular vulnerability scanners: it provides you the ability to develop your own exploits and delivery mechanisms.
随着等级保护的应用和普及,网络安全漏洞扫描需充分考虑执行效率和功能的扩展性问题。
With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.
漏洞扫描过程可以划分为一系列步骤,每个步骤都是查找应用程序或操作系统中的弱点所需的关键任务。
The process of vulnerability scanning can be broken down into a series of steps, each of which is a vital task needed to locate the weaknesses in an application or operating system.
漏洞扫描过程可以划分为一系列步骤,每个步骤都是查找应用程序或操作系统中的弱点所需的关键任务。
The process of vulnerability scanning can be broken down into a series of steps, each of which is a vital task needed to locate the weaknesses in an application or operating system.
应用推荐