Abstract:In network security, the vulnerability scanner will find the hidden vulnerability. In this paper, the classifications of vulnerability and the principle of vulnerability scanner are introduced. Based on the protocol classification, and combined with the s