In recent years, with the rise of the concept of actual offense and defense, security managers have gradually discovered that traditional vulnerability scanning tools have prominent disadvantages in actual offensive and defensive confrontation: their indiscriminateness, high false alarms, and low returns have become a curse that hinders their own development. The requirements of offensive and defensive confrontation are very different. In order to meet the needs of current users in vulnerability identification and detection, Hua Yunan has created an enterprise-level lightweight vulnerability discovery and detection tool-Lingjian Weakness Identification and Detection System Ai.Scan (hereinafter referred to as Lingjian).
Deep integration of demand and technology, the first choice for enterprise-level lightweight vulnerability detection
Lingjian converts Hua Yunan’s long-term experience in vulnerability mining and offensive and defensive combat into AI models and PoC verification models, and provides users with high-quality combat scenarios such as 1-day vulnerability emergency response, offensive and defensive drills, and high-quality vulnerability mining. Vulnerability detection. Lingjian supports multiple offensive and defensive scenarios including asset detection, weak password detection, Web vulnerability detection, host vulnerability detection, baseline configuration verification, etc. It provides professional, simple and easy-to-use visualization tools to help companies eliminate security risks more accurately and efficiently.
Lingjian originates from the industry and serves the industry. Hua Yunan has deeply integrated its in-depth understanding of industry user needs and innovative technologies over the past two years, making it possible to identify and detect security vulnerabilities more accurately and efficiently, and to scan and respond more quickly. At the same time, the bottom layer of Lingjian uses a cloud-native technology architecture. We hope that Lingjian can become a handy tool for user vulnerability detection in the turbulent cloud-native era, and become a must for enterprises to deploy proactive defense strategies for actual offensive and defensive confrontation.
Lingjian is committed to helping users easily build actual combat defense capabilities, so that security weaknesses are invisible, and it maximizes the value of technological innovation to present and release:
1 Active and passive two-pronged approach, knowledge graph empowers fingerprint detection
Lingjian detects asset open port information and fingerprint information based on two modes: active and passive. Based on deep learning algorithms, knowledge graph fingerprint database and built-in 17000+ self-developed detection rules, it accurately analyzes and recognizes target fingerprint information.
2 Harmless PoC vulnerability detection close to 0 false positives
From the perspective of offensive and defensive combat, Lingjian adopts the PoC method for principle + self-verification detection, and the accuracy is as high as 98%, so that security personnel can get rid of the trouble of false alarms and false alarms. Through automatic filtering and screening, Lingjian focuses on vulnerabilities that are highly harmful to customers and can be highly utilized, which greatly improves customer work efficiency. Unlike traditional scanners that use a large number of rules and full tests to cause excessive burden on the business system, Lingjian combines the fingerprint engine to accurately and efficiently scan, and it only takes 10 minutes to complete the vulnerability detection of thousands of assets. At the same time, Lingjian makes full use of Go’s technical advantages in multi-threading and high concurrency, and dynamically regulates the detection process based on AI algorithms to achieve fast and efficient.
3 Scan and response without time difference
Lingjian adopts a streaming data output mode, which realizes a zero-day fast response and solves the shortcomings of traditional missing scanning tools that cannot obtain results before the scan is completed. Report vulnerabilities to users as soon as they are discovered, so as to quickly deal with vulnerabilities and shorten the exposure time of risks.
4 Cloud native architecture with extensible functions
The bottom layer of Lingjian uses cloud native technology architecture, and all components are deployed in the form of microservices. At the same time, with business upgrades and demand expansion, users can expand their functions and scanning capabilities by upgrading certificates, and quickly implement product upgrades without additional deployment or purchase of other products.
Vulnerabilities are an important source of cyber attacks and the core of security. The comprehensive discovery and identification of vulnerabilities and weaknesses in existing assets is the first step in building a network defense system. Lingjian will become the “whistleblower” of vulnerability security, providing strong support for the strategic deployment of actual combat defense of enterprises, and helping enterprises achieve rapid defense and effective defense.
At the same time, Lingjian weakness identification and detection system and Lingdong adaptive threat and vulnerability management system are in the same line. They are the long-term tracking and research of global vulnerability attack and defense dynamics by dozens of security experts of Hua Yunan, as well as rich experience in actual combat. Highlight.