The duration of a vulnerability scan is subject to the number of added assets and the complexity of webpages. Generally, it takes tens of minutes to scan a 100-page website for vulnerabilities.
No. VSS simulates access requests of real users with precise rate control and won't affect the normal business operations.
VSS relies on the computing power of Tencent Cloud to implement rapid scaling. It can scan tens of millions of IT assets.
Yes. You can customize keywords in the console for monitoring.
VSS can detect weak passwords, webpage compliance issues, as well as vulnerabilities in web services, web middleware, databases, operating systems, software services, IoT devices, routers, cameras, and industrial control devices.
Yes. VSS simulates user behaviors by using real browsers and supports modern JS frameworks, including Vue, React, and AngularJS.
VSS performs security scan by simulating hacker intrusions (harmless attacks) over the public network. If your server has protection measures or restricts accessing IPs, in order to ensure normal scanning, we recommend you add the following IP addresses to the allowlist.
The scan node IPs of VSS are as follows:
No. For example, if you have already authorized
bb.com, you don't need to authorize
Log in to the VSS console, click the target task name in the task management section to enter the task details page, click Download Report, and the report will be exported.