
Topwalk Vulnerability Scanning System (Topwalk-VSS) is a comprehensive vulnerability discovery and assessment system independently developed by Topwalk, integrating years of experience in vulnerability mining and security services. Composed of five components—Web Vulnerability Scanning, System Vulnerability Scanning, Weak Password Scanning, Security Baseline Detection, and Database Vulnerability Scanning—it helps users identify various assets in the network, accurately and efficiently detect vulnerability risks, and provides professional and effective security analysis and rectification suggestions based on scanning results.


Supports configuration verification for various asset types including host systems, network devices, security devices, databases, middleware, virtualization/big data, with built-in authoritative security baseline verification specifications from level protection, MIIT, China Telecom, China Mobile, etc.

Features weak password vulnerability detection, supporting brute-force cracking of weak passwords for mainstream protocols, middleware, databases, cameras, and Web applications, with support for custom password dictionaries.

- Web Scanning: Classifies vulnerabilities based on OWASP TOP10 common Web vulnerabilities, detects security flaws in Web sites (such as SQL injection, Cookie injection, blind injection, XSS, file inclusion, sensitive information leakage, etc.), and provides security solution suggestions;
- Database Scanning: Conducts security scans on database systems focusing on configuration, authentication and authorization, vulnerability and patch management, to discover and assess potential security vulnerabilities and weaknesses.

Supports discovering security vulnerabilities in network devices and host systems, covering multiple vulnerability standards such as CVE, CVSS, CNVD, CNNVD, CNCVE, and Bugtraq.

In collaboration with the company's Future Laboratory and Vulnerability Security Research Institute, vulnerability announcements and updates are released on a weekly basis, with critical vulnerabilities addressed within 24 hours.
Service registration is completed through page interaction, with registration information including basic details such as the application to which the service belongs, service name, service type (HTTP/WebService), instance IP and port, and root path; disaster recovery strategies such as request retry, circuit breaking, and degradation can be configured. The system supports Referer anti-leeching, release mode, IP whitelist, and security authentication functions to further enhance security.
Early Warning Configuration: Managed by application granularity, supporting flexible setting of multiple trigger conditions such as excessive response time, incorrect data format, flow control triggering, and circuit breaking, with dual notifications via email and SMS after triggering;
01

Suitable for government agencies, large enterprises and other scenarios requiring internal network data interface security. Such units cannot directly open interface calls to external networks, and need to meet external interface call needs without direct internal-external network connectivity. By deploying the vulnerability scanning system and supporting secure data service gateway, it can realize data interface encapsulation, security processing and transmission, building an interface call protection system.
Contact number: +8613810035865
Enterprise Email: liuyl@topwalk.com
Address: Building 3, Courtyard 6, Jianfeng Road (South Extension), Haidian District, Beijing
All Rights Reserved by TRS Topwalk Information Technology Co., Ltd.