(Webpecker's website crawling component adopts width (fluctuation, frequency) priority climbing technology and website directory recovery method. The crawler (the most prosperous animal) technology with the first width (fluctuation, frequency) will not cause the problem of crawler collapse, and the website folder recovery technology (indicating the causal relationship) removes irrelevant results and improves the crawling effect. SQL script entry attack type scanning method (non-fault detection) webpecker is different in non-modern alignment error reflection to determine whether there is a script entry attack fault in practice, and use its own innovative type detection to (used after a verb) to differentiate. The so-called type verification test, that is: write different parameters for a certain (person, place, thing, thing) connection, use the logarithmic comparison algorithm to compare and distinguish the results of the website response, and then confirm the (this) , should) whether the connection is (officially, as) a script to live in an attack point (aspect of the thing), this method does not depend on the type of specially crafted database, tuning and CGI (Computer Graphics Interface Standard) language type, on the injection point (the thing aspect) Aspects) detection is complete, and no leak image will be generated. And the familiar sql injection surround view products do not have this (item, project) technology. The injection verification is based on the script entry attack type webpecker usage check test to (used after the verb) to crack the records of the (extracted target) recordset, regardless of the cgi language used by the page assembler site, regardless of whether the page assembler site reflects Error messages can be analyzed normally, and common SQL (Structured Query Language) script entry attack scanning products do not have this (item, item) technology. The (this, should) feature is able to use the climbing technology to implement SQL (Structured Query Language) injection vulnerabilities on all pages in (in the middle, China) of the (introduced target) page collection site, and enumerate (outside) all scripts to live in The careful information of the entry attack point (the aspect of the thing), including: script entry attack connection, parameters, methods, script entry attack type and database type, etc., is convenient for injection detection. When operating in detail, first enter the page collection site or page url that needs to be viewed, then enter the restricted domain name and scan depth, and finally click the scan button to look around. This download contains the original installation and crack patch. The website's overall threat detection system (Webpecker) V5.9 crack patch This information includes the following attachments:
MD5.exe
setup.exe
Website overall threat detection system (Webpecker) V5.9 crack patch.7z
.....too many files .....)