Scenario of vulnerability scanning technology

Through vulnerability scanning, administrators can understand the security settings and running application services of the system, discover security vulnerabilities in a timely manner, and objectively assess the level of security risks. Administrators can correct system security vulnerabilities and incorrect settings based on scanning results, and take preventive measures before hacker attacks occur. If firewalls and network monitoring systems are passive defense measures, then security scanning is an active preventive measure that can effectively prevent hacker attacks and prevent them before they happen.

Regular network security self testing and evaluation

Check after installing new software and starting new services

Security planning evaluation and effectiveness verification before and after network construction and network transformation

Security testing before undertaking important tasks on the network

Analysis and investigation after network security incidents

Preparation before major cybersecurity incidents

Security checks organized by public security and confidentiality departments

Aladdin Honeypot Technology Innovation
  • Web application scanning
  • System leakage scan
  • Expert verification and analysis
  • Vulnerability Scanning Report
  • Expert vulnerability security consultation
  • Cloud based vulnerability detection service

Web application scanning

Check whether there are security vulnerabilities that can be exploited by hackers in information system web programs that provide information services through B/S mode. Implementation engineers use professional web vulnerability scanning tools remotely or on-site to automatically scan and discover various vulnerabilities on system web access pages within authorized scope. Including but not limited to the following vulnerability detection: injection vulnerability, XSS vulnerability, CSRF vulnerability, insecure configuration for information leakage, unauthorized access, deserialization, directory enumeration, arbitrary jump, Struts2 vulnerability, SSRF vulnerability, XML entity injection (XXE), JSON vulnerability, weak password vulnerability, ThinkPHP vulnerability, etc

System leakage scan

Check whether there are security vulnerabilities that can be exploited by hackers in information system web programs that provide information services through B/S mode. Implementation engineers use professional web vulnerability scanning tools remotely or on-site to automatically scan and discover various vulnerabilities on system web access pages within authorized scope. Including but not limited to the following vulnerability detection: injection vulnerability, XSS vulnerability, CSRF vulnerability, insecure configuration for information leakage, unauthorized access, deserialization, directory enumeration, arbitrary jump, Struts2 vulnerability, SSRF vulnerability, XML entity injection (XXE), JSON vulnerability, weak password vulnerability, ThinkPHP vulnerability, etc

Expert verification and analysis

Check whether there are security vulnerabilities that can be exploited by hackers in information system web programs that provide information services through B/S mode. Implementation engineers use professional web vulnerability scanning tools remotely or on-site to automatically scan and discover various vulnerabilities on system web access pages within authorized scope. Including but not limited to the following vulnerability detection: injection vulnerability, XSS vulnerability, CSRF vulnerability, insecure configuration for information leakage, unauthorized access, deserialization, directory enumeration, arbitrary jump, Struts2 vulnerability, SSRF vulnerability, XML entity injection (XXE), JSON vulnerability, weak password vulnerability, ThinkPHP vulnerability, etc

Vulnerability Scanning Report

Check whether there are security vulnerabilities that can be exploited by hackers in information system web programs that provide information services through B/S mode. Implementation engineers use professional web vulnerability scanning tools remotely or on-site to automatically scan and discover various vulnerabilities on system web access pages within authorized scope. Including but not limited to the following vulnerability detection: injection vulnerability, XSS vulnerability, CSRF vulnerability, insecure configuration for information leakage, unauthorized access, deserialization, directory enumeration, arbitrary jump, Struts2 vulnerability, SSRF vulnerability, XML entity injection (XXE), JSON vulnerability, weak password vulnerability, ThinkPHP vulnerability, etc

Expert vulnerability security consultation

Check whether there are security vulnerabilities that can be exploited by hackers in information system web programs that provide information services through B/S mode. Implementation engineers use professional web vulnerability scanning tools remotely or on-site to automatically scan and discover various vulnerabilities on system web access pages within authorized scope. Including but not limited to the following vulnerability detection: injection vulnerability, XSS vulnerability, CSRF vulnerability, insecure configuration for information leakage, unauthorized access, deserialization, directory enumeration, arbitrary jump, Struts2 vulnerability, SSRF vulnerability, XML entity injection (XXE), JSON vulnerability, weak password vulnerability, ThinkPHP vulnerability, etc

Cloud based vulnerability detection service

Check whether there are security vulnerabilities that can be exploited by hackers in information system web programs that provide information services through B/S mode. Implementation engineers use professional web vulnerability scanning tools remotely or on-site to automatically scan and discover various vulnerabilities on system web access pages within authorized scope. Including but not limited to the following vulnerability detection: injection vulnerability, XSS vulnerability, CSRF vulnerability, insecure configuration for information leakage, unauthorized access, deserialization, directory enumeration, arbitrary jump, Struts2 vulnerability, SSRF vulnerability, XML entity injection (XXE), JSON vulnerability, weak password vulnerability, ThinkPHP vulnerability, etc

Service list