[Osaka/Yokohama/Tokushima] Looking for infrastructure/server side engineers!

[Osaka/Yokohama/Tokushima] Looking for infrastructure/server side engineers!

[Deployed by over 500 companies] AWS construction, operation, maintenance, and monitoring services

[Deployed by over 500 companies] AWS construction, operation, maintenance, and monitoring services

[Successor to CentOS] AlmaLinux OS server construction/migration service

[Successor to CentOS] AlmaLinux OS server construction/migration service

[For WordPress only] Cloud server “Web Speed”

[For WordPress only] Cloud server “Web Speed”

[Cheap] Website security automatic diagnosis “Quick Scanner”

[Cheap] Website security automatic diagnosis “Quick Scanner”

[Reservation system development] EDISONE customization development service

[Reservation system development] EDISONE customization development service

[Registration of 100 URLs is 0 yen] Website monitoring service “Appmill”

[Registration of 100 URLs is 0 yen] Website monitoring service “Appmill”

[Compatible with over 200 countries] Global eSIM “Beyond SIM”

[Compatible with over 200 countries] Global eSIM “Beyond SIM”

[If you are traveling, business trip, or stationed in China] Chinese SIM service “Choco SIM”

[If you are traveling, business trip, or stationed in China] Chinese SIM service “Choco SIM”

[Global exclusive service] Beyond's MSP in North America and China

[Global exclusive service] Beyond's MSP in North America and China

[YouTube] Beyond official channel “Biyomaru Channel”

[YouTube] Beyond official channel “Biyomaru Channel”

A free and easy way for anyone to diagnose web content vulnerabilities

This is Ohara from the technical sales department.

This time's theme is "Web content vulnerability diagnosis."

As the blog title states,
we will introduce ``a free and easy way for anyone to diagnose vulnerabilities in web content''.

With any tool, you basically just enter the URL of the website you want to diagnose, so
it's really easy.

How to diagnose website vulnerabilities

■ gred
http://check.gred.jp/

This is a free version of "gred" provided by Secure Brain.


After entering the URL of the website in the form above and clicking the "CHECK" button, you
will be shown a result of the danger of the target web page after a short wait.
(If the website has many pages, it may take some time to judge.)

Unlike the paid version, some functions are limited, but
the feature is that you can also obtain linked pages and domain information.

■ Site Security Center
https://global.sitesafety.trendmicro.com/?cc=jp

This is a free website diagnostic service provided by Trend Micro.

to judge websites in four stages: safe, dangerous, suspicious, and unrated, and
even determine the category of the website.

Just like with gred above, if you enter the website URL in the form and
click the "Check now" button, you will receive the following judgment.

This time, I diagnosed it on Beyond's corporate website.
Of course, it is judged as a "safe" site, and it is judged in the "Computer/Internet" category.

By the way, newly created websites or
websites whose business content is difficult to discern from the content on the top page are likely to be marked as "not rated."

 summary

It is predicted that attacks targeting vulnerabilities in websites and applications will continue to increase in intensity.

Although it is possible to understand the current status to some extent with the free vulnerability diagnosis introduced, we

still recommend installing a paid version of the security service to block attacks and detect tampering in real time

↓↓↓ [Click here for security services handled by Beyond] ↓↓↓

https://beyondjapan.com/option/deepsecurity

https://beyondjapan.com/option/waf

https://beyondjapan.com/option/gred

If you found this article helpful , please give it a like!
0
Loading...
0 votes, average: 0.00 / 10
2,550
X facebook Hatena Bookmark pocket
[2025.6.30 Amazon Linux 2 support ended] Amazon Linux server migration solution

[2025.6.30 Amazon Linux 2 support ended] Amazon Linux server migration solution

The person who wrote this article

About the author

ohara

I started my career in the telecommunications industry as a salesperson in charge of introducing IT products such as NW services, OA equipment, and groupware for corporations.

After that, he worked as a pre-sales engineer for physical servers/hosting services and as a customer engineer for SaaS-type SFA/CRM/BtoB e-commerce at an SIer-based data center business company, before joining his current company, Beyond.

Currently, I am stationed in Shenzhen, China, the Silicon Valley of Asia, and my daily routine is to watch Chinese dramas and billbill.

Qualification: Second class bookkeeping