Overview

Benefits

Comprehensive Vulnerability Scan
The Vulnerability Scan Service boasts a comprehensive library of vulnerability rules encompassing the primary 10 web vulnerabilities outlined by OWASP, including SQL injection, cross-site scripting (XSS) attacks, cross-site request forgery (CSRF), and weak password issues. It is also adept at efficiently identifying vulnerabilities, whether they are newly discovered (0-day), known (1-day), or have been around for some time (N-day).

Overall Asset Support

Threat Intelligence Linkage

Smart Risk Alarming
The Vulnerability Scan Service promptly activates real-time alerts through multiple channels, accompanied by expert recommendations for managing any identified risks associated with network assets. This ensures you remain well-informed and can promptly address any issues that arise.
Features
Automatic Asset Discovery
The Vulnerability Scan Service effectively recognizes device operating systems, ports, services, and components, enhancing your ability to uncover unidentified assets and effectively oversee and regulate existing ones.
Web Vulnerability Detection
0/1/N-Day Vulnerability Detection
The Vulnerability Scan Service platform comes equipped with a vast array of harmless proof of concepts (POCs) meticulously tested and scrutinized by security engineers. These POCs are designed to confirm various types of vulnerabilities, including those in web applications, web integration layers, databases, operating systems, and software services.
Weak Password Detection
The Vulnerability Scan Service conducts scans on numerous asset components to identify weak passwords, encompassing FTP, SSH, RDP, MySQL, Oracle, IMAP, Memcached, and Redis, among others.
Risk Evaluation Report
Scenarios
Website Risk Scan
Server Risk Scan
Mini Program Risk Scan
API Security
IoT Security

The Vulnerability Scan Service conducts thorough scans of your websites to safeguard them against web vulnerabilities, newly discovered (0-day), known (1-day), and long-standing (N-day) vulnerabilities, availability risks, and weak password vulnerabilities.

The Vulnerability Scan Service is capable of organizing your servers both on and off the cloud, conducting vulnerability scans to identify potential risks, service availability concerns, and port vulnerabilities. This aids in the detection of shadow assets and ports. The findings of these scans will be presented in detailed asset analysis and vulnerability reports, accompanied by expert recommendations for remediation.

The Vulnerability Scan Service safeguards the core logic of your WeChat mini-programs against cracking and misuse by automatically detecting web services, APIs, and content, and by hardening virtual machines through JavaScript source code obfuscation.

The Vulnerability Scan Service assesses APIs for web-layer vulnerabilities, configuration adherence, data exposure risks, and feature availability. This supports the development of proactive security frameworks in accordance with industry standards like OpenAPI, alongside a cohesive API security strategy.

The Vulnerability Scan Service offers a diverse range of fingerprints and proof of concepts (PoCs) for discovering IoT devices, detecting vulnerabilities, and conducting firmware security scans. Additionally, it provides sophisticated code obfuscation and instruction-level binary obfuscation techniques tailored to various platforms such as ARM.