CN102970282B - website security detection system - Google Patents

website security detection system Download PDF

Info

Publication number
CN102970282B
CN102970282B CN201210426532.2A CN201210426532A CN102970282B CN 102970282 B CN102970282 B CN 102970282B CN 201210426532 A CN201210426532 A CN 201210426532A CN 102970282 B CN102970282 B CN 102970282B
Authority
CN
China
Prior art keywords
website
network address
leak
results
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210426532.2A
Other languages
Chinese (zh)
Other versions
CN102970282A (en
Inventor
龙专
赵武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qianxin Technology Group Co Ltd
Secworld Information Technology Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201210426532.2A priority Critical patent/CN102970282B/en
Publication of CN102970282A publication Critical patent/CN102970282A/en
Application granted granted Critical
Publication of CN102970282B publication Critical patent/CN102970282B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of website security detection system, it comprises web portal security checkout equipment, one or more Website server and web crawlers equipment, wherein, described web portal security checkout equipment, be suitable for receiving network address from described web crawlers equipment and also construct the detection network address that is associated with described network address in order to using its accessing website, thus judge whether described network address exists leak; One or more Website server described, is suitable for, in response to described web portal security checkout equipment to the access of website, returning results to described web portal security checkout equipment; And described web crawlers equipment, be suitable for the network address capturing website from one or more Website server described, and described network address is sent to described web portal security checkout equipment.

Description

Website security detection system
Technical field
The present invention relates to computer network security, particularly relate to a kind of website security detection system.
Background technology
Leak refers to the weakness that computer system exists or defect.The mistake that leak may produce from defect when application software or operating system design or when encoding, also may from the unreasonable part in the design defect of business in iterative process or logic flow.These defects, mistake or unreasonable part may be had a mind to or by mistake be utilized, thus adverse effect is caused to the assets organized or operation, attacked as information system or control, capsule information are stolen, user data is tampered, and system is by the springboard as other host computer systems of invasion.From the leak found at present, the leak in application software is far away more than the leak in operating system, and the leak particularly in WEB application system accounts for the overwhelming majority in information system leak especially.
It is the critical process that assailant and protection person both sides resist that leak finds, if protection person can not find the leak that can be utilized early than assailant, assailant just likely utilizes leak to launch a offensive.More early find and patching bugs, the possibility that information security events occurs is less.Specialty vulnerability scanning system is a kind of important means finding leak, and it can find that remote server port distributes automatically, judges the service provided, and detects long-range or local host security vulnerabilities.After finding leak, also to check the accuracy of vulnerability scanning result further by the validating vulnerability of automatic or manual.The operation maintenance personnel of information system regularly should carry out vulnerability scanning, and Timeliness coverage is quick patching bugs also.
In traditional website vulnerability scanning product, only can carry out leak test for the page existed, and after discovery leak, lack necessary validating vulnerability mechanism, cause wrong report very high.
Summary of the invention
In view of the above problems, propose the present invention, to provide a kind of website security detection system overcoming the problems referred to above or solve the problem at least in part.
According to the present invention, provide a kind of website security detection system, it comprises web portal security checkout equipment, one or more Website server and web crawlers equipment, wherein,
Described web portal security checkout equipment, is suitable for receiving network address from described web crawlers equipment and also constructs the detection network address that is associated with described network address in order to using its accessing website, thus judge whether described network address exists leak;
One or more Website server described, is suitable for, in response to described web portal security checkout equipment to the access of website, returning results to described web portal security checkout equipment; And
Described web crawlers equipment, is suitable for the network address capturing website from one or more Website server described, and described network address is sent to described web portal security checkout equipment.
Alternatively, described web portal security checkout equipment comprises network interface, is suitable for receiving network address, and utilizes the network address accessing website received, and obtains returning results of described website.
This web portal security checkout equipment also comprises network address constructor, be suitable for the network address obtaining website from network interface, and according to the network address of this website construct be associated with this website first detect network address, and construct the second detection network address detecting network address corresponding to first based on the first detection network address, and the first detection network address and the second detection network address are sent to described network interface.
In addition, web portal security checkout equipment also comprises loophole detector, be suitable for receiving from network interface returning results corresponding to first of this first detection network address, return results based on first and detect website and whether there is leak, when testing result indicates described website to there is leak, obtain from network interface and detect corresponding second the returning results of network address with second, and return results based on second and verify whether described website exists leak.
Alternatively, web portal security checkout equipment can also comprise memory according to an embodiment of the invention, is suitable for storing vulnerability database, records network address constructor and be used for structure first and detect the formation rule of network address and predefined leak judgment rule in vulnerability database.
The invention provides above-mentioned website security detection system.According to embodiments of the invention, website can be detected based on returning results of utilizing the first detection network address access websites to obtain and whether there is leak, and what obtain based on utilizing the second detection network address access websites corresponding to the first detection network address returns results the authenticity verifying this leak, like this, the problem that in Hole Detection, ubiquitous rate of false alarm is high can be solved well, significantly reduce rate of false alarm, improve quality and the efficiency of Hole Detection, be conducive to finding leak early, maintenance information safety.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of specification, and can become apparent, below especially exemplified by the specific embodiment of the present invention to allow above and other objects of the present invention, feature and advantage.
Accompanying drawing explanation
By reading hereafter detailed description of the preferred embodiment, various other advantage and benefit will become cheer and bright for those of ordinary skill in the art.Accompanying drawing only for illustrating the object of preferred implementation, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
Fig. 1 is the flow chart of website security detection method according to an embodiment of the invention;
Fig. 2 is the flow chart of step S108 in website security detection method according to an embodiment of the invention;
Fig. 3 is the flow chart of step S108 in website security detection method according to another embodiment of the invention;
Fig. 4 is the block diagram of web portal security checkout equipment according to an embodiment of the invention; And
Fig. 5 is the block diagram of website security detection system according to an embodiment of the invention.
Embodiment
Below with reference to accompanying drawings exemplary embodiment of the present disclosure is described in more detail.Although show exemplary embodiment of the present disclosure in accompanying drawing, however should be appreciated that can realize the disclosure in a variety of manners and not should limit by the embodiment set forth here.On the contrary, provide these embodiments to be in order to more thoroughly the disclosure can be understood, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
Fig. 1 schematically illustrates the flow chart of website security detection method 100 according to an embodiment of the invention.As shown in Figure 1, in website security detection method 100 according to an embodiment of the invention, the method starts from step S102, in step s 102, according to the network address of website, construct be associated with this website first detect network address.
According to embodiments of the invention, network address can be such as URL(Uniform ResourceLocator, URL(uniform resource locator)), be hereinafter described for URL, but network address is not limited in URL, but the mode of any marked net station address can be comprised.
According to one embodiment of present invention, before execution above-mentioned steps S102, step S101 can be performed: capture network address from website.Alternatively, this step S101 can be performed by web crawlers, that is, web crawlers captures network address from the Website server at place, website.
Next, in step s 102, according to captured network address, construct be associated with this website first detect network address.According to embodiments of the invention, in the network address of this website, the character string determined according to the leak type that will test or predefined leak judgment rule can be added, to construct the first detection network address.For example, suppose website URL that web crawlers captures be http://xxx.com(wherein " x " can be any letter or number), if the leak type of testing is responsive catalogue, then can construct the first detection network address: http://xxx.com/admin/, suppose that the website URL that web crawlers captures is http://webscan.xxx.com/app/, if the leak type that will test is backup directory, then can construct the first detection network address: http://webscan.xxx.com/app.bak, suppose that web crawlers has grabbed file http://webscan.xxx.com/b.asp, if the leak type that will test is backup file, then can construct the first detection network address: http://webscan.xxx.com/b.asp.tar.gz, if pre-defined leak judgment rule is XSS(Cross-Site Scripting, cross site scripting) rule, character string " <script>alert (42873) </script> " then can be added after captured URL, in this case, if the URL captured is http://aaa.com/a.asp a=1, the first then constructed address test is: http://aaa.com/a.asp a=1<script>alert (42873) </script>.Those skilled in the art can easy understand, the mode that above-mentioned structure first detects network address is only example, scope of the present invention is not limited thereto, other can also be adopted to construct the mode of the first address test, such as by SQL(Structured Query Language, SQL) inject rule as predefined leak judgment rule, determine the character string that will add.
Then, in step S 104, utilize the first detection network address to visit this website, and detect this website whether there is leak based on returning results of this website.According to embodiments of the invention, can judging whether returning results of this website meets predefined leak judgment rule, when meeting, indicating this website to there is leak.This return results can comprise in state code, content of pages, page header information one or more.Still be described for XSS rule, suppose to utilize above-mentioned first address test http://aaa.com/a.asp a=1<script>alert (42873) </script> to access this website, if comprise character string " <script>alert (42873) </script> " in the content of pages returned, then think that this returns results and meet XSS rule, indicate this website to there is leak.Similarly, if adopt SQL to inject rule as predefined leak judgment rule, then now can judging to return results whether meet SQL injection rule, when meeting, indicating this website to there is leak.In addition, such as, utilize above-mentioned first to detect network address http://xxx.com/admin/ accessing website, detect responsive catalogue leak, if the state code returned is 200(OK), content of pages is greater than 10 characters, then this website can be indicated to there is leak.
Next, in step s 106, when testing result indicates this website to there is leak, based on this first detection network address, structure corresponds to the second detection network address that first detects network address.According to embodiments of the invention, can detect in network address first and add checking character string, to construct the second detection network address.Alternatively, the length of this checking character string is greater than a character.
Network address http://xxx.com/admin/ is detected with first above, http://webscan.xxx.com/app.bak, http://webscan.xxx.com/b.asp.tar.gz, http://aaa.com/a.asp a=1<script>alert (42873) </script> is example, constructed second detects network address can be respectively http://xxx.com/adminXXXXX/, http://webscan.xxx.com/appXXXXXX.bak, http://webscan.xxx.com/bXXXX.asp.tar.gz, http://aaa.com/aXXXXXX.asp a=1<script>alert (42873) </script>, wherein " X " can be any character.
Subsequently, in step S108, utilize this second detection network address to visit this website, and verify whether this website exists this leak based on returning results of this website.
Fig. 2 schematically illustrates the flow chart of step S108 in website security detection method according to an embodiment of the invention, as shown in Figure 2, in this embodiment, the step that whether above-mentioned checking website exists leak can comprise sub-step S108a, S108b and S108c.
First, in sub-step S108a, judge whether returning results of website meets predefined leak judgment rule, network address http://aaa.com/aXXXXXX.asp a=1<script>alert (42873) </script> is detected for XSS rule and above-mentioned second, utilize this second detection network address accessing website, if comprise character string " <script>alert (42873) </script> " in the content of pages returned, then think that this returns results and meet XSS rule, if and do not comprise character string " <script>alert (42873) </script> " in the content of pages returned, then think that this returns results and do not meet XSS rule.In sub-step S108b, do not meet leak judgment rule if returned results, then can determine that this website exists this leak.And in sub-step S108c, if return results when meeting leak judgment rule, then can determine that this website does not exist this leak.That is, for utilizing the first detection network address access and utilizing the second the returning results of detection network address access that with the addition of arbitrary string wherein should be different, if identical, then may there is wrong report in the server at place, website.
In superincumbent sub-step S108b and S108c, if returning results of utilizing the second detection network address access websites to obtain with utilize the first detection network address to access this website obtains return results consistent, all meet such as XSS rule, then can determine that this website does not exist this leak, before based on utilizing the leak returned results indicated by the detection carried out of the first detection network address access websites to be wrong report, without the need to reporting this leak; And if returning results of utilizing the second detection network address access websites to obtain is with utilizing the first detection network address to access, and this website obtaining returns results inconsistent, not meeting such as XSS rule, just can determine that this website exists this leak, and report this leak.
Fig. 3 schematically illustrates the flow chart of step S108 in website security detection method according to another embodiment of the invention, as shown in Figure 3, in this embodiment, step S 108 can comprise sub-step S108a ', S108b ', S108c ' and S108d '.
First, in sub-step S108a ', utilize the second detection network address repeatedly access websites, and obtain multiple returning results; Next, in sub-step S108b ', judge whether multiple returning results meets predefined leak judgment rule; Then, in sub-step S108c ' and S108d ', when if the ratio meeting the result of leak judgment rule in returning results multiple is more than or equal to predefined threshold value, determine that this website does not exist this leak, if and multiple return results in meet the result of leak judgment rule ratio when being less than predefined threshold value, determine that this website exists this leak.This predefined threshold value can be such as 0.5, but is not limited thereto value, but can choose according to actual needs.When this threshold value is 0.5, the result meeting leak judgment rule in returning results if multiple more than or equal not meet the result of leak judgment rule, then determine that this website does not exist this leak, before based on utilizing the leak returned results indicated by the detection carried out of the first detection network address access websites to be wrong report, without the need to reporting this leak; Otherwise if the result meeting leak judgment rule in returning results multiple is less than the result not meeting leak judgment rule, then can determines that this website exists this leak, and report this leak.
The invention provides a kind of website security detection method.According to embodiments of the invention, website can be detected based on returning results of utilizing the first detection network address access websites to obtain and whether there is leak, and what obtain based on utilizing the second detection network address access websites corresponding to the first detection network address returns results the authenticity verifying this leak, like this, the problem that in Hole Detection, ubiquitous rate of false alarm is high can be solved well, significantly reduce rate of false alarm, improve quality and the efficiency of Hole Detection, be conducive to finding leak early, maintenance information safety.
Corresponding with above-mentioned method 100, present invention also offers a kind of web portal security checkout equipment 200.Fig. 4 schematically illustrates the block diagram of web portal security checkout equipment according to an embodiment of the invention.See Fig. 4, web portal security checkout equipment 200 mainly comprises network interface 201, network address constructor 203, loophole detector 205.
According to embodiments of the invention, network interface 201 is suitable for receiving network address, and utilizes the network address accessing website received, and obtains returning results of website.Network address constructor 203 is suitable for the network address obtaining website from network interface 201, and according to the network address of this website construct be associated with this website first detect network address, and construct the second detection network address corresponding to this first detection network address based on this first detection network address, and the first detection network address and the second detection network address are sent to network interface 201.Loophole detector 205 is suitable for receiving from network interface 201 returning results corresponding to first of this first detection network address, return results based on first and detect website and whether there is leak, when there is leak in testing result instruction website, obtain from network interface 201 and detect corresponding second the returning results of network address with second, and return results based on second and verify whether website exists leak.According to embodiments of the invention, first of access websites returns results one or more that to return results with second and comprise in state code, content of pages, page header information.Above-mentioned network interface 201, network address constructor 203 and loophole detector 205 may be used for performing step S102 in said method 100, S104, S106 and S108.
According to embodiments of the invention, web portal security checkout equipment 200 can also comprise memory 207, be suitable for storing vulnerability database, record network address constructor in this vulnerability database and be used for structure first and detect the formation rule of network address and predefined leak judgment rule (as XSS, SQL rule such as such as).
According to embodiments of the invention, network address constructor 203 in the network address of website, can add the character string determined according to the leak type that will test or predefined leak judgment rule, to construct the first detection network address.
Still for above for the example in the description of method 100, corresponding to website http://xxx.com, http://webscan.xxx.com/app/, http://webscan.xxx.com/b.asp, first of http://aaa.com/a.asp a=1 detects network address can be respectively http://xxx.com/admin/, http://webscan.xxx.com/app.bak, http://webscan.xxx.com/b.asp.tar.gz, http://aaa.com/a.asp a=1<script>alert (42873) </script>.
As mentioned above, loophole detector 205 receives from network interface 201 and corresponds to this and first detect first returning results of network address, returns results detect website and whether there is leak based on first.Wherein, loophole detector 205 judges first of website returns results whether meet predefined leak judgment rule, and when meeting, instruction website exists leak.
Still be described for XSS rule, suppose to utilize above-mentioned first address test http://aaa.com/a.asp a=1<script>alert (42873) </script> to access this website, if comprise character string " <script>alert (42873) </script> " in the content of pages returned, then think that this first returns results and meet XSS rule, this website is indicated to there is leak.In addition, such as, utilize above-mentioned first to detect network address http://xxx.com/admin/ accessing website, detect responsive catalogue leak, if the state code returned is 200(OK), content of pages is greater than 10 characters, then this website can be indicated to there is leak.
According to embodiments of the invention, network address constructor 203 can detect in network address first and add checking character string, to construct the second detection network address.Still detect network address http://xxx.com/admin/ with first above, http://webscan.xxx.com/app.bak, http://webscan.xxx.com/b.asp.tar.gz, http://aaa.com/a.asp a=1<script>alert (42873) </script> is example, constructed second detects network address can be respectively http://xxx.com/adminXXXXX/, http://webscan.xxx.com/appXXXXXX.bak, http://webscan.xxx.com/bXXXX.asp.tar.gz, http://aaa.com/aXXXXXX.asp a=1<script>alert (42873) </script>, wherein " X " can be any character.
According to one embodiment of present invention, loophole detector 205 judges second of website returns results whether meet predefined leak judgment rule, when second return results do not meet predefined leak judgment rule, determine that this website exists this leak, or when second return results meet predefined leak judgment rule, determine that this website does not exist this leak.If second return results return results with first consistent, all meet such as XSS rule, then can determine that this website does not exist this leak, be wrong report based on the first leak returned results indicated by the detection carried out before loophole detector 205, without the need to reporting this leak; And if second return results return results with first inconsistent, do not meet such as XSS rule, can determine that this website exists this leak with regard to loophole detector 205, and report this leak.
According to another embodiment of the invention, loophole detector 205 utilizes the second detection network address repeatedly to access this website, and obtains multiple second and return results; Judge multiple second returns results whether meet predefined leak judgment rule; When the ratio meeting the result of predefined leak judgment rule during multiple second returns results is more than or equal to predefined threshold value, determine that website does not exist this leak; Or when the ratio meeting the result of predefined leak judgment rule during multiple second returns results is less than predefined threshold value, determine that this website exists this leak.This predefined threshold value can be such as 0.5, but is not limited thereto value, but can choose according to actual needs.When this threshold value is 0.5, if multiple second return results in meet leak judgment rule result more than or equal not meet the result of leak judgment rule, then determine that this website does not exist this leak, be wrong report based on the first leak returned results indicated by the detection carried out, without the need to reporting this leak before; Otherwise, if multiple second return results in meet leak judgment rule result be less than the result not meeting leak judgment rule, then can determine that this website exists this leak, and report this leak.
Because above-mentioned each equipment (device) embodiment is corresponding with aforementioned approaches method embodiment, therefore no longer each device embodiment is described in detail.
According to another aspect of the invention, a kind of website security detection system 1000 is additionally provided.Fig. 5 schematically illustrates the block diagram of website security detection system 1000 according to an embodiment of the invention, see Fig. 5, website security detection system 1000 can comprise web portal security checkout equipment 200, be suitable for receiving network address from described web crawlers equipment 400 and also construct the detection network address that is associated with described network address in order to using its accessing website, thus judge whether described network address exists leak; Also comprise one or more Website server 300-1 ..., 300-n, be suitable for the access in response to web portal security checkout equipment 200 pairs of websites, return results to web portal security checkout equipment 200; Also comprise web crawlers equipment 400, be suitable for from one or more Website server 300-1 ..., 300-n captures the network address of website, and network address sent to web portal security checkout equipment 200.
Intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with display at this algorithm provided.Various general-purpose system also can with use based on together with this teaching.According to description above, the structure constructed required by this type systematic is apparent.In addition, the present invention is not also for any certain programmed language.It should be understood that and various programming language can be utilized to realize content of the present invention described here, and the description done language-specific is above to disclose preferred forms of the present invention.
In specification provided herein, describe a large amount of detail.But can understand, embodiments of the invention can be put into practice when not having these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand in each inventive aspect one or more, in the description above to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes.But, the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires feature more more than the feature clearly recorded in each claim.Or rather, as claims below reflect, all features of disclosed single embodiment before inventive aspect is to be less than.Therefore, the claims following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and adaptively can change the module in the device in embodiment and they are arranged in one or more devices different from this embodiment.Some block combiner in embodiment can be become a module or unit or assembly, and multiple submodule or subelement or sub-component can be put them in addition.Except at least some in such feature and/or process or module be mutually repel except, any combination can be adopted to combine all processes of all features disclosed in this specification (comprising adjoint claim, summary and accompanying drawing) and so disclosed any method or equipment or unit.Unless expressly stated otherwise, each feature disclosed in this specification (comprising adjoint claim, summary and accompanying drawing) can by providing identical, equivalent or similar object alternative features replaces.
In addition, those skilled in the art can understand, although embodiments more described herein to comprise in other embodiment some included feature instead of further feature, the combination of the feature of different embodiment means and to be within scope of the present invention and to form different embodiments.Such as, in detail in the claims, the one of any of embodiment required for protection can use with arbitrary compound mode.
Each device embodiment of the present invention with hardware implementing, or can realize with the software module run on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that the some or all functions that microprocessor or digital signal processor (DSP) can be used in practice to realize according to the some or all modules in the device of the embodiment of the present invention.The present invention can also be embodied as part or all the device program (such as, computer program and computer program) for performing method as described herein.Realizing program of the present invention and can store on a computer-readable medium like this, or the form of one or more signal can be had.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or provides with any other form.
The present invention will be described instead of limit the invention to it should be noted above-described embodiment, and those skilled in the art can design alternative embodiment when not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and does not arrange element in the claims or step.Word "a" or "an" before being positioned at element is not got rid of and be there is multiple such element.The present invention can by means of including the hardware of some different elements and realizing by means of the computer of suitably programming.In the unit claim listing some devices, several in these devices can be carry out imbody by same hardware branch.Word first, second and third-class use do not represent any order.Can be title by these word explanations.

Claims (9)

1. a website security detection system (1000), comprise web portal security checkout equipment (200), one or more Website server (300-1 ..., 300-n) and web crawlers equipment (400), wherein,
Described web portal security checkout equipment (200), be suitable for from described web crawlers equipment (400) receive website network address and according to described network address construct be associated with this website first detect network address and visit this website in order to it, and detect described website whether there is leak based on returning results of this website, when testing result indicates described website to there is leak, network address is detected based on described first, structure corresponds to the second detection network address that described first detects network address, and utilize described second to detect network address and visit this website, and verify whether described website exists described leak based on returning results of this website,
One or more Website server described (300-1 ..., 300-n), be suitable for, in response to described web portal security checkout equipment (200) to the access of website, returning results to described web portal security checkout equipment (200); And
Described web crawlers equipment (400), be suitable for from one or more Website server described (300-1 ..., 300-n) and capture the network address of website, and described network address is sent to described web portal security checkout equipment (200).
2. the system as claimed in claim 1, wherein, described web portal security checkout equipment (200) comprising:
Network interface (201), is suitable for receiving network address, and utilizes the network address accessing website received, and obtain returning results of described website;
Network address constructor (203), be suitable for the network address obtaining website from described network interface (201), and according to the network address of this website construct be associated with this website first detect network address, and construct the second detection network address detecting network address corresponding to described first based on described first detection network address, and described first detection network address and the second detection network address are sent to described network interface (201);
Loophole detector (205), be suitable for receiving from described network interface (201) returning results corresponding to first of this first detection network address, return results based on described first and detect described website and whether there is leak, when testing result indicates described website to there is leak, obtain from described network interface and to detect corresponding second the returning results of network address with described second, and return results based on described second and verify whether described website exists leak.
3. system as claimed in claim 2, wherein, described network address security detection equipment (200) also comprises memory (207), be suitable for storing vulnerability database, record network address constructor in described vulnerability database and be used for structure first and detect the formation rule of network address and predefined leak judgment rule.
4. system as claimed in claim 2 or claim 3, wherein said network address constructor (203) is in the network address of described website, add the character string determined according to the leak type that will test or predefined leak judgment rule, detect network address to construct described first.
5. system as claimed in claim 2 or claim 3, wherein said loophole detector (205) judges first of described website returns results whether meet predefined leak judgment rule, when meeting, indicates described website to there is leak.
6. system as claimed in claim 2 or claim 3, wherein said network address constructor (203) is detected in network address described first and is added checking character string, to construct the second detection network address.
7. system as claimed in claim 3, wherein said loophole detector (205) judges second of described website returns results whether meet described predefined leak judgment rule, when described second return results do not meet described predefined leak judgment rule, determine that described website exists described leak, or when described second return results meet described predefined leak judgment rule, determine that described website does not exist described leak.
8. system as claimed in claim 3, wherein said loophole detector (205) utilizes described second to detect network address and repeatedly accesses described website, and obtains multiple second and return results; Judge described multiple second returns results whether meet described predefined leak judgment rule; When the ratio meeting the result of described predefined leak judgment rule during described multiple second returns results is more than or equal to predefined threshold value, determine that described website does not exist described leak; Or when the ratio meeting the result of described predefined leak judgment rule during described multiple second returns results is less than predefined threshold value, determine that described website exists described leak.
9., as the system in claim 2,3,7,8 as described in any one, first of the described website of wherein said access returns results one or more that to return results with second and comprise in state code, content of pages, page header information.
CN201210426532.2A 2012-10-31 2012-10-31 website security detection system Active CN102970282B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210426532.2A CN102970282B (en) 2012-10-31 2012-10-31 website security detection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210426532.2A CN102970282B (en) 2012-10-31 2012-10-31 website security detection system

Publications (2)

Publication Number Publication Date
CN102970282A CN102970282A (en) 2013-03-13
CN102970282B true CN102970282B (en) 2015-08-19

Family

ID=47800168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210426532.2A Active CN102970282B (en) 2012-10-31 2012-10-31 website security detection system

Country Status (1)

Country Link
CN (1) CN102970282B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103001946B (en) * 2012-10-31 2016-01-06 北京奇虎科技有限公司 Website security detection method and equipment
CN103530565A (en) * 2013-10-21 2014-01-22 北京锐安科技有限公司 Method and device for scanning website program bugs based on web
CN103647678A (en) * 2013-11-08 2014-03-19 北京奇虎科技有限公司 Method and device for online verification of website vulnerabilities
CN104618176B (en) * 2014-12-29 2017-11-24 北京奇安信科技有限公司 website security detection method and device
CN104506541A (en) * 2014-12-29 2015-04-08 北京奇虎科技有限公司 Website loophole alarming method and device
CN108629182B (en) * 2017-03-21 2022-11-04 腾讯科技(深圳)有限公司 Vulnerability detection method and vulnerability detection device
CN109033838A (en) * 2018-07-27 2018-12-18 平安科技(深圳)有限公司 Website security detection method and device
CN109446441B (en) * 2018-09-26 2020-11-03 北京邮电大学 General credible distributed acquisition and storage system for network community
CN110598415B (en) * 2019-08-16 2021-07-27 苏州浪潮智能科技有限公司 Security vulnerability emergency response triggering judgment method and device
CN111935121B (en) * 2020-07-31 2022-04-26 北京天融信网络安全技术有限公司 Vulnerability reporting method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866817A (en) * 2006-06-15 2006-11-22 北京华景中天信息技术有限公司 Website safety risk estimating method and system
CN101312393A (en) * 2007-05-24 2008-11-26 北京启明星辰信息技术有限公司 Detection method and system for SQL injection loophole
US8239952B1 (en) * 2007-02-01 2012-08-07 Mcafee, Inc. Method and system for detection of remote file inclusion vulnerabilities
CN103001946A (en) * 2012-10-31 2013-03-27 北京奇虎科技有限公司 Website security detection method, website security detection equipment and website security detection system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101001132B1 (en) * 2008-02-22 2010-12-15 엔에이치엔비즈니스플랫폼 주식회사 Method and System for Determining Vulnerability of Web Application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866817A (en) * 2006-06-15 2006-11-22 北京华景中天信息技术有限公司 Website safety risk estimating method and system
US8239952B1 (en) * 2007-02-01 2012-08-07 Mcafee, Inc. Method and system for detection of remote file inclusion vulnerabilities
CN101312393A (en) * 2007-05-24 2008-11-26 北京启明星辰信息技术有限公司 Detection method and system for SQL injection loophole
CN103001946A (en) * 2012-10-31 2013-03-27 北京奇虎科技有限公司 Website security detection method, website security detection equipment and website security detection system

Also Published As

Publication number Publication date
CN102970282A (en) 2013-03-13

Similar Documents

Publication Publication Date Title
CN102970282B (en) website security detection system
CN103001946B (en) Website security detection method and equipment
Gupta et al. PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications
US8572750B2 (en) Web application exploit mitigation in an information technology environment
CN106101145B (en) A kind of website vulnerability detection method and device
CN104767757B (en) Various dimensions safety monitoring method and system based on WEB service
CN101964025B (en) XSS detection method and equipment
CN104301302B (en) Go beyond one&#39;s commission attack detection method and device
CN102882886B (en) A kind of network terminal and method presenting the relevant information of access websites
CN103368957B (en) Method and system that web page access behavior is processed, client, server
CN103001817B (en) A kind of method and apparatus of real-time detection of webpage cross-domain request
CN108989355B (en) Vulnerability detection method and device
CN103491543A (en) Method for detecting malicious websites through wireless terminal, and wireless terminal
CN105631341B (en) Blind detection method and device for vulnerability
CN104063309A (en) Web application program bug detection method based on simulated strike
CN104618178A (en) Website bug online evaluation method and device
CN103647678A (en) Method and device for online verification of website vulnerabilities
CN106548075B (en) Vulnerability detection method and device
CN102592089B (en) Detection method and detection device for webpage redirection skip loophole
CN103632100A (en) Method and device for detecting website bugs
CN104618177A (en) Website bug examination method and device
US20160134658A1 (en) Unauthorized access detecting system and unauthorized access detecting method
CN104506541A (en) Website loophole alarming method and device
CN102045319A (en) Method and device for detecting SQL (Structured Query Language) injection attack
CN102546618A (en) Method, device, system and website for detecting fishing website

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20161228

Address after: 100015 Chaoyang District Road, Jiuxianqiao, No. 10, building No. 3, floor 15, floor 17, 1701-26,

Patentee after: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

CB03 Change of inventor or designer information

Inventor after: Long Zhuan

Inventor after: Meng Jun

Inventor after: Liu Xuezhong

Inventor after: Zhao Wu

Inventor before: Long Zhuan

Inventor before: Zhao Wu

CB03 Change of inventor or designer information
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180720

Address after: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Co-patentee after: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc.

Patentee after: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

Address before: No. 3, No. 10, No. 10, No. 10, Lu Jia, 1701-26, 17

Patentee before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088

Patentee after: Qianxin Technology Group Co.,Ltd.

Patentee after: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc.

Address before: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Patentee before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

Patentee before: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210105

Address after: 100044 2nd floor, building 1, yard 26, Xizhimenwai South Road, Xicheng District, Beijing

Patentee after: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc.

Patentee after: Qianxin Technology Group Co.,Ltd.

Address before: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088

Patentee before: Qianxin Technology Group Co.,Ltd.

Patentee before: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 2nd Floor, Building 1, Yard 26, Xizhimenwai South Road, Xicheng District, Beijing, 100032

Patentee after: Qianxin Wangshen information technology (Beijing) Co.,Ltd.

Patentee after: Qianxin Technology Group Co.,Ltd.

Address before: 100044 2nd floor, building 1, yard 26, Xizhimenwai South Road, Xicheng District, Beijing

Patentee before: LEGENDSEC INFORMATION TECHNOLOGY (BEIJING) Inc.

Patentee before: Qianxin Technology Group Co.,Ltd.