PreviousArticleYou have introduced the "authorized scanning" and "weak password scanning" of the "database Vulnerability Scanning System ", today, we will go to "unauthorized scanning" For MySQL and ms SQL Server ".
Create a database vulnerability scan task, which is mysql. Enter the address, port, Instance name, and database version.
Select the appropriate database vulnerability scan policy
Initiate a scan ...... The scanning speed is very fast. The scanning can be completed in less than 1 minute. Before writing this article, we specifically downloaded the old MySQL version to test the effect. Therefore, of the 226 items checked, 216 were passed and 5 were not passed, among them, 3 are high risks and 2 are medium risks.
You can generate scan reports in Doc, PDF, and HTML formats, including vulnerability descriptions and security recommendations.
Through this article, we can see that the database risk can be easily evaluated through the database vulnerability scan system.
This "database vulnerability scan" topic contains 6 articles,:
-
- Evaluate database security by using database vulnerability scan 1 Overview
- Evaluate database security by using database vulnerability scan 2 create a scan task
-
- Use Database vulnerability scan to evaluate database security 3 Authorization Scan
-
- Evaluate database security by using database vulnerability scan 4 weak password Scan
- Evaluate database security using database vulnerability scan 5 unauthorized scanning
-
- Evaluate database security with database vulnerability scan 6 penetration attacks
Author: Source of reprinted by Zhang baichuan (Web Ranger) www.youxia.org! Thank you.