top of page


Host Vulnerability Service
-
Purpose: Host vulnerability scanning is to identify security vulnerabilities or weaknesses in the host system that could be exploited by hackers to compromise the system or perform other malicious activities.
-
Details: The scanning tool will perform automated tests on the host to detect common vulnerabilities, and the scan results will be provided to administrators so that they can take appropriate action to patch these vulnerabilities and enhance the security of the system.
-
Check items: Network services/operating system unpatched vulnerabilities/common application weaknesses/network and security device weaknesses/system insecurity settings/known common backdoor programs/simple account and password cracking.

Website Vulnerability Scanning
-
Purpose: Website Vulnerability Scan aims to identify security vulnerabilities in website applications to prevent hackers from exploiting these vulnerabilities to carry out attacks, such as intrusion, data theft, etc.
-
Details: The scanning tool will perform automated tests on the website to detect a variety of possible vulnerabilities, including SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and more. The results of the scan will be provided to the developer or system administrator to help them patch these vulnerabilities and harden the security of the website.
-
Check items: Web Service Vulnerability Scanning/Web Application Scan (SQL Injection, XSS...) etc.)/ASP, ASP.NET, PHP, Perl, Java/J2EE, etc. Scanning/evaluating web services for weaknesses or insecure settings/Automatically searching backup files, log files, smart files or directories.
bottom of page