Topwalk-VSS
Topwalk-VSS
Topwalk-VSS

Topwalk Vulnerability Scanning System (Topwalk-VSS) is a comprehensive vulnerability discovery and assessment system independently developed by Topwalk, integrating years of experience in vulnerability mining and security services. Composed of five components—Web Vulnerability Scanning, System Vulnerability Scanning, Weak Password Scanning, Security Baseline Detection, and Database Vulnerability Scanning—it helps users identify various assets in the network, accurately and efficiently detect vulnerability risks, and provides professional and effective security analysis and rectification suggestions based on scanning results.

Home > Network security >
Core Values

Hidden Site Detection

Hidden Site Detection
Automatically discovers host and website assets within the network environment, builds asset lists, and enables group-based management.
 
 

Security Baseline Verification

Security Baseline Verification

Supports configuration verification for various asset types including host systems, network devices, security devices, databases, middleware, virtualization/big data, with built-in authoritative security baseline verification specifications from level protection, MIIT, China Telecom, China Mobile, etc.

Weak Password Detection

Weak Password Detection

Features weak password vulnerability detection, supporting brute-force cracking of weak passwords for mainstream protocols, middleware, databases, cameras, and Web applications, with support for custom password dictionaries.

Web and Database Scanning

Web and Database Scanning

- Web Scanning: Classifies vulnerabilities based on OWASP TOP10 common Web vulnerabilities, detects security flaws in Web sites (such as SQL injection, Cookie injection, blind injection, XSS, file inclusion, sensitive information leakage, etc.), and provides security solution suggestions;

- Database Scanning: Conducts security scans on database systems focusing on configuration, authentication and authorization, vulnerability and patch management, to discover and assess potential security vulnerabilities and weaknesses.

System Scanning

System Scanning

Supports discovering security vulnerabilities in network devices and host systems, covering multiple vulnerability standards such as CVE, CVSS, CNVD, CNNVD, CNCVE, and Bugtraq.

Vulnerability Database Update:

Vulnerability Database Update:

In collaboration with the company's Future Laboratory and Vulnerability Security Research Institute, vulnerability announcements and updates are released on a weekly basis, with critical vulnerabilities addressed within 24 hours.

Product Advantages
Security Enhancement Technology
Security Enhancement Technology

Service registration is completed through page interaction, with registration information including basic details such as the application to which the service belongs, service name, service type (HTTP/WebService), instance IP and port, and root path; disaster recovery strategies such as request retry, circuit breaking, and degradation can be configured. The system supports Referer anti-leeching, release mode, IP whitelist, and security authentication functions to further enhance security.

Interface Response and Application Early Warning
Interface Response and Application Early Warning

Early Warning Configuration: Managed by application granularity, supporting flexible setting of multiple trigger conditions such as excessive response time, incorrect data format, flow control triggering, and circuit breaking, with dual notifications via email and SMS after triggering;

Application Scenarios

01

Application Scenarios

Application Scenarios

Suitable for government agencies, large enterprises and other scenarios requiring internal network data interface security. Such units cannot directly open interface calls to external networks, and need to meet external interface call needs without direct internal-external network connectivity. By deploying the vulnerability scanning system and supporting secure data service gateway, it can realize data interface encapsulation, security processing and transmission, building an interface call protection system.