CN108667770A - A kind of loophole test method, server and the system of website - Google Patents

A kind of loophole test method, server and the system of website Download PDF

Info

Publication number
CN108667770A
CN108667770A CN201710197801.5A CN201710197801A CN108667770A CN 108667770 A CN108667770 A CN 108667770A CN 201710197801 A CN201710197801 A CN 201710197801A CN 108667770 A CN108667770 A CN 108667770A
Authority
CN
China
Prior art keywords
url link
test
website
measured
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710197801.5A
Other languages
Chinese (zh)
Other versions
CN108667770B (en
Inventor
郭晶
胡珀
郑兴
王放
张强
范宇河
唐文韬
杨勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710197801.5A priority Critical patent/CN108667770B/en
Publication of CN108667770A publication Critical patent/CN108667770A/en
Application granted granted Critical
Publication of CN108667770B publication Critical patent/CN108667770B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention discloses loophole test method, server and the system of a kind of website, this method includes:It obtains client and is sent to the access request of Website server, and Website server will be given in acquired access request;The access request includes:The corresponding at least one uniform resource position mark URL link of Website server;The acquired each access request of record;If detecting website vulnerability test instruction, the access request of record is transferred, at least one URL link to be measured is determined from the corresponding URL link of access request transferred;The test URL link for being revised as each URL link to be measured to have loophole test statement obtains the corresponding test URL link of each URL link to be measured;According to each test URL link, the website vulnerability test result of each URL link to be measured is determined.Based on method disclosed by the invention, realize that website burden is lighter, and the comprehensive higher website vulnerability test of test result.

Description

A kind of loophole test method, server and the system of website
Technical field
The present invention relates to website security technical fields, and in particular to a kind of loophole test method of website, server and is System.
Background technology
With the development of web technology, web portal security problem becomes increasingly conspicuous, and the loophole of especially website is easy to be attacked Person utilizes, and to influence the safety of website, therefore tests website vulnerability, finds that the loophole present in website seems in time and particularly must It wants.
The test mode of current web loophole mainly uses active scan mode, such as captures net by web crawlers The URL to stand carries out loophole test according to the URL captured to website;This URL that website is captured by web crawlers comes real Showing the problems of the mode of website vulnerability test is:Web crawlers crawls website, can be caused to website prodigious Flow pressure;Therefore how a kind of website vulnerability test method that website burden is lighter is provided, those skilled in the art are become Problem needed to be considered.
Invention content
In view of this, the embodiment of the present invention provides a kind of loophole test method, server and the system of website, to realize net The lighter website vulnerability test of burden of standing.
To achieve the above object, the embodiment of the present invention provides the following technical solutions:
A kind of loophole test method of website, including:
It obtains client and is sent to the access request of Website server, and the net will be given in acquired access request Site server;The access request includes:The corresponding at least one uniform resource position mark URL link of the Website server;
The acquired each access request of record;
If detecting website vulnerability test instruction, the access request of record is transferred, it is corresponding from the access request transferred At least one URL link to be measured is determined in URL link;
The test URL link for being revised as each URL link to be measured to have loophole test statement obtains each URL link to be measured Corresponding test URL link;
According to each test URL link, the website vulnerability test result of each URL link to be measured is determined.
The embodiment of the present invention also provides a kind of server, including:
Access agent module, is sent to the access request of Website server for obtaining client, and by acquired visit It asks in request and is given to the Website server;The access request includes:The corresponding unified resource positioning of the Website server Accord with URL link;
Logging modle, for recording acquired each access request;
If link determining module to be measured transfers the access request of record, from institute for detecting website vulnerability test instruction At least one URL link to be measured is determined in the corresponding URL link of access request transferred;
Test link determining module, the test URL chains for being revised as each URL link to be measured that there is loophole test statement It connects, obtains the corresponding test URL link of each URL link to be measured;
Loophole test result determining module, for according to each test URL link, determining that each test URL link is corresponding and waiting for Survey the website vulnerability test result of URL link.
The embodiment of the present invention also provides a kind of loophole test system of website, including:
Proxy server, is sent to the access request of Website server for obtaining client, and by acquired access The Website server is given in request;The access request includes:The corresponding uniform resource locator of the Website server URL link;
Database, for recording each access request acquired in the proxy server;
If loophole test server transfers record from the database for detecting website vulnerability test instruction Access request determines at least one URL link to be measured from the corresponding URL link of access request transferred;By each URL to be measured Link is revised as the test URL link with loophole test statement, obtains the corresponding test URL link of each URL link to be measured;Root According to each test URL link, the website vulnerability test result of the corresponding URL link to be measured of each test URL link is determined.
Based on the above-mentioned technical proposal, the access request that the embodiment of the present invention can be sent client by access agent form In be given to Website server, to be recorded to the access request obtained during access agent, to need to carry out website When loophole is tested, the URL link to be measured of loophole to be measured can be determined from the URL link that the access request of record is included, and will Each URL link to be measured is revised as the test URL link with loophole test statement, and then is tested according to each test URL link Website vulnerability is utilized situation, with the test result of each test URL link, to determine each URL link to be measured accordingly Website vulnerability test result, realize website loophole test.
Since the embodiment of the present invention is to be sent to the visit of Website server by the client obtained during access agent It asks request, realizes the loophole test of website, therefore can be in client in the normal access process of website, getting test website URL link used in loophole, website only need to cope with normal access, and the flow burden of website is lighter.As it can be seen that the present invention is real The loophole test method of the website of example offer is applied, it can be achieved that lighter website vulnerability test is born in website.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the system architecture schematic diagram of the loophole test method provided in an embodiment of the present invention for realizing website;
Fig. 2 is the signaling process figure of the loophole test method of website provided in an embodiment of the present invention;
Fig. 3 is another signaling process figure of the loophole test method of website provided in an embodiment of the present invention;
Fig. 4 is another signaling process figure of the loophole test method of website provided in an embodiment of the present invention;
Fig. 5 is scene method flow diagram provided in an embodiment of the present invention;
Fig. 6 is that the loophole of website provided in an embodiment of the present invention tests the hardware component schematic diagram of system;
Fig. 7 is the method flow diagram of the loophole test method of website provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of server provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is the system architecture schematic diagram of the loophole test method provided in an embodiment of the present invention for realizing website, with reference to figure 1, which may include:Client 10, proxy server 20, database 30 and loophole test server 40;
Wherein, client 10 can be loaded on the mobile terminals such as smart mobile phone, tablet computer and laptop, at this In inventive embodiments, client 10 has Webpage function of browse;If client 10 can be web browser, for another example client It can be embedded in the component etc. with page browsing function in end 10;
Proxy server 20, loophole test server 40 can be disposed on the service equipment of network side;
Wherein, proxy server 20 is the computer system for providing external network proxy services or the other kinds of network terminal, Network agent refers specifically to allow a network terminal, generally client, by this service and another network terminal, generally For server, indirect connection is carried out, the network equipments such as some gateways and router have network agent function;
Database 30 is to come tissue, storage and the warehouse for managing data according to data structure, builds on computer storage and sets It is standby upper;
Loophole test server 40 is to export the service equipment of the required website vulnerability test result of the embodiment of the present invention, Loophole test server 40 can be realized by single server, can also be realized by the server farm that multiple servers form.
Based on above system framework, below to a kind of signaling of the loophole test method of website provided in an embodiment of the present invention Flow is introduced, and a kind of optional signaling process figure can be as shown in Figure 2.
Before the step S101 in executing signaling process figure shown in Fig. 2, it is necessary first to which institute is arranged in Configuration network environment There is the flow from client to Website server all to pass through proxy server;Then it is generation of the proxy server setting for communication Manage agreement, wherein agency agreement can be http agreements or https agreements, specific protocol type can according to actual needs into Row selection;It is finally that browser or gateway proxy is arranged in proxy server.
Further, to ensure the agent security of proxy server, after to proxy server setting agency agreement success, Can also to client provide an agent address for needing basic certifications, specific authentication mode may be used password authentication and/ Or IP white lists;
It should be noted that a kind of common authentication mode of basic certifications, is usually used in the verification of stateless client, than Such as the certification of HTTP Invoker (HTTP call device) or Web Service (Web platforms), the characteristics of this scene is client End is accessed every time in application, all in request header carrying authentication information, is generally exactly username and password, because of basic certifications It can transmit in plain text, so https transmission datas are preferred.
Fig. 2 is returned to, signaling process shown in Fig. 2 may include steps of:
S101, proxy server obtain client and are sent to the access request of Website server, and by acquired access The Website server is given in request;The access request includes:The corresponding at least one unified resource of Website server is fixed Position symbol URL link;
During executing step S101, access request can be before website is reached the standard grade, and client is to Website server Test access request when what is sent is used for unit testing, regression test and functional test can also be client to website What server was sent is used to watch video, plays the daily access requests such as game.
Each access request is recorded in database for S102, proxy server;
S103 transfers the access of record if loophole test server detects website vulnerability test instruction from database Request;
During executing step S103, the generating mode of website vulnerability test instruction can be artificial output, also may be used When being that present system time reaches test period, system automatically generated;
Optionally, when loophole test server maiden visit database, called data library whole access request, and from institute At least one URL link to be measured is determined in the whole corresponding URL links of access request transferred;
Optionally, the access request for the carry out website vulnerability test transferred can be also marked, tests and takes when loophole When business device accesses database again, not labeled access request can be transferred from database, this has further ensured that loophole Test comprehensive and that removes processed access request from transfer processing again, promotion treatment effeciency.
S104, loophole test server carry out duplicate removal processing to the corresponding URL link of the access request transferred;
It, can be according to similarity calculating method for each URL link transferred during executing step S104 The degree of correlation with other URL links is calculated separately, and retains other each URL links that the degree of correlation is less than threshold value, for example, for URL link " 201702171234.htmlId=2 ", with URL link " 201702171234.htmlId=1 " is due to the degree of correlation It is very high, therefore test one of URL link;
It should be noted that similarity calculation is used to weigh the similarity degree between object, in data mining and nature It is a basic calculating in Language Processing, main includes the Similarity measures between character representation and characteristic set, and is directed to Different application scenarios are limited to the limitation of data scale and space-time expense etc., can be from cosine similarity computational methods, Pearson It is specifically chosen in coefficient calculation method and adjustment cosine similarity computational methods.
S105, loophole test server, which is transferred, has tested URL link table, and the URL link charting of having tested has The URL link of website vulnerability test is carried out;
S106, loophole test server from the URL link after duplicate removal processing, are removed according to URL link table has been tested The URL link for having carried out website vulnerability test obtains candidate URL link;
S107, loophole test server analyzes the URL link with controllable parameter in candidate URL link, and will have can The URL link for controlling parameter sorts out polymerization;
The URL link with controllable parameter for sorting out polymerization is determined as at least one wait for by S108, loophole test server Survey URL link;
S109, for a URL link to be measured, the parameter of the URL link to be measured is split, is obtained by loophole test server To each fractionation parameter;
S110, loophole test server determine the controllable at least one target component of parameter value from each fractionation parameter, will The parameter value of each target component replaces with the payload using website vulnerability;
During executing step S110, it can determine that the controllable target component of parameter value is generally through inventor's analysis Id and user, for example, a http GET request:“http://www.xxx.comGinseng controllable id=1&user=test " Number refers to that " id " and " user ", parameter value are the subsequent value of parameter equal sign, wherein the corresponding parameter value of parameter " id " is " 1 " Corresponding parameter value is " test " with parameter " user ";After it is target component to determine parameter " id ", by the parameter of target component Value replaces with the payload using website vulnerability, for example, the corresponding parameter value " 1 " of target component " id " is replaced with " 2 ".
S111, loophole test server replace with the target component of payload according to parameter value, generate the URL chains to be measured Connect corresponding test URL link;
During generating test URL link in executing step S111, if the parameters after splitting are determined For target component, and corresponding parameter value is replaced, then is spliced replaced payload one by one;If split It is partly targeted parameter in parameters afterwards, also, the parameter value of target component is replaced, then has replaced Parameter after effect load and the remaining fractionation not being replaced is spliced one by one.
S112, the corresponding test request of each test URL link is sent to Website server by loophole test server, to obtain Get the corresponding feedback result of each test request;
During executing step S112, test URL link can be sent to network server by loophole test server, To obtain the corresponding feedback result of each test URL link of network server feedback.
S113, for a URL link to be measured, loophole test server is according to the corresponding test request for testing URL link The feedback result of feedback result and the URL link to be measured determines the website vulnerability test result of the URL link to be measured;
During executing step S113, for a URL link to be measured, loophole test server compares the URL to be measured The feedback result of the test request of the feedback result of link and corresponding test URL link, you can comparing result determines that this is to be measured The website vulnerability test result of URL link;Specifically, if two feedback results are consistent, illustrate the URL link to be measured without leakage Hole;If two feedback results are inconsistent, illustrate that the URL link to be measured is leaky.
Above step S105~step S106 is only that " loophole test server is according to duplicate removal disclosed in the embodiment of the present application A kind of preferred realization method of URL link afterwards, determining candidate's URL link " process, the specific implementation in relation to this process Inventor can be arbitrarily arranged according to the demand of oneself, not limit herein.Also, work as loophole test server maiden visit data When library, the URL link after duplicate removal is directly determined as candidate URL link;When loophole test server is not maiden visit data When library, transferring the record being generated in advance has the URL link table of test for the URL link for having carried out website vulnerability test, and root According to URL link table has been tested from the URL link after duplicate removal processing, removal has carried out the URL link of website vulnerability test, obtains To the candidate URL link.
Above step S107~step S108 is only that " loophole test server is to candidate disclosed in the embodiment of the present application URL link carries out classification polymerization, and at least one URL link to be measured is determined from classification polymerization result " one kind of process is excellent The realization method of choosing, the specific implementation inventor in relation to this process can arbitrarily be arranged according to the demand of oneself, not do herein It limits.Also, loophole test server classify polymerization process in, first to candidate URL link according to whether there are parameter into Row classification further judges whether parameter therein is controllable parameter, for example, ginseng to each candidate URL link there are parameter Number " id " and " user ", so that it is determined that at least one, there are the URL links to be measured of controllable parameter.
Above step S104~step S108 is only that " loophole test server is from being transferred disclosed in the embodiment of the present application The corresponding URL link of access request in determine at least one URL link to be measured " a kind of preferred realization method of process, have The specific implementation inventor for closing this process can be arbitrarily arranged according to the demand of oneself, not limit herein.
Above step S109~step S111 is only that " loophole test server will be each to be measured disclosed in the embodiment of the present application URL link is revised as the test URL link with loophole test statement " a kind of preferred realization method of process, this related mistake The specific implementation of journey can also be directly to carry out parameter value replacement to the controllable parameter area of URL link to be measured, and inventor can root Arbitrarily it is arranged according to the demand of oneself, does not limit herein.
Above step S112~step S113 is only " according to each test URL link, to be determined disclosed in the embodiment of the present application A kind of preferred realization method of each website vulnerability test result for testing the corresponding URL link to be measured of URL link " process, has The specific implementation for closing this process can also be directly to carry out parameter value replacement, invention to the controllable parameter area of URL link to be measured People can be arbitrarily arranged according to the demand of oneself, not limit herein.
It should be noted that since proxy server records acquired each access request into database, number PostgreSQL database mysql can be used according to library, specifically, PostgreSQL database mysql can store access request in the form of log recording, And log recording includes the packet header uniform resource position mark URL link http, for example, parameter or cookie;
PostgreSQL database mysql is a kind of associated data library management system, and linked database saves the data in different In table, rather than all data are placed in one big warehouse, which adds speed and improve flexibility;And it increases income Sql like language used in database mysql is the most frequently used standardized language for accessing database.PostgreSQL database mysql Software uses double authorization policies, is divided into Community Edition and commercial version, since its is small, speed is fast, the total cost of ownership is low, especially It is this feature of open source code, and the exploitation of general middle-size and small-size website all selects PostgreSQL database mysql as site databases.
In embodiments of the present invention, loophole test server carries out loophole test, the present invention to the URL link to be measured of crawl Inventor find, can be to website during loophole test server captures URL link to be measured in the method for web crawlers Prodigious flow pressure is caused, and can not crawl into website and hide deeper link, leads to website vulnerability test result It is comprehensive relatively low, it is found by inventor's analysis, concrete reason may be:
Web crawlers technology starts from uniform resource address (URLs) list for being referred to as seed, and web crawlers accesses system Some uniform resource position mark URL link in one resource address list starts, and reads the URL link and corresponds to the interior of webpage Hold, and a list to be visited is written into other URL links for including on the webpage found, i.e., it is so-called " territory of creeping " (crawl frontier), in turn, according to URL link whole in the preset strategy cyclic access list.
Web crawlers, which needs to replicate during accessing each URL link, files and saves as that corresponding " webpage is fast According to ", it includes html, picture, doc, pdf, multimedia, dynamic web page and other formats to preserve format, due to each URL link pair The web page contents answered are continually changing, therefore web crawlers is also required to constantly update all " snapshots of web pages " of crawl, still Crawl mass data can pose a big pressure to website in short time;
Simultaneously as web crawlers does not have powerful operating interactive ability and a business understandability, therefore can only be The crawl of page structure relatively simple website, for having complicated authentication, with baffle strategy, with complex operations logic Or the website with the isolated island page, web crawlers need human assistance to be collected URL link, i.e. web crawlers generally can not It crawls into website and hides deeper link, lead to the comprehensive relatively low of website vulnerability testing result.
Based on this, the embodiment of the present invention is sent to the visit of Website server by the client obtained during access agent It asks request, realizes the loophole test of website, therefore can be in client in the normal access process of website, getting test website URL link used in loophole, website only need to cope with normal access, and the flow burden of website is lighter.
Further, the Website page link that the URL link involved by the access request to website is covered more fully, is sent out The probability for now hiding deeper URL link is higher, may make that URL link used in test website vulnerability can be more comprehensive The most of page for covering website, promotes the comprehensive of the loophole test result of final website.As it can be seen that the embodiment of the present invention provides Website loophole test method, it can be achieved that website burden is lighter, and the comprehensive higher website vulnerability test of test result.
In conjunction with the loophole test method of website illustrated in fig. 2, the loophole that the embodiment of the present invention provides another website is surveyed Method for testing may also include the steps of S114 after step sl 13, and signaling process figure is as shown in Figure 3:
S114, loophole test server export each URL to be measured according to the website vulnerability test result of each URL link to be measured The test of link exports as a result, so that the website vulnerability test result to each URL link to be measured is verified;
Wherein, include the URL link to be measured, the URL link pair to be measured for the test of a URL link to be measured output result The access request answered, the corresponding test URL link of the URL link to be measured, the parameter of the test URL link, the test URL link At least one of the feedback result of Website server corresponding to corresponding access request and the test URL link.
In the loophole test method of website disclosed by the embodiments of the present invention, the specific implementation procedure of step S101~S113 with Consistent disclosed in step S101~S113 in above-described embodiment, details are not described herein, refers to portion disclosed in above-described embodiment Point.
As it can be seen that the loophole test method of website provided in an embodiment of the present invention is, it can be achieved that website burden is lighter, and tests knot The comprehensive higher website vulnerability test of fruit, and realized to each URL link to be measured by exporting website vulnerability test result Website vulnerability test result verified.
In conjunction with the loophole test method of website illustrated in fig. 2, the loophole that the embodiment of the present invention provides another website is surveyed Method for testing may also include the steps of S115 between step S102 and step S103, and signaling process figure is as shown in Figure 4:
S115, proxy server distinguish the access request recorded according to the time interval that access request obtains, Obtain the corresponding task names table of each time interval;Wherein, the task names table record has corresponding time interval to be recorded Access request, time interval corresponds to a test period;
In executing step S115 implementation procedures, for the website that the part update cycle is short, for example, news website, needs Periodic scan is carried out to the webpage of the website, proxy server is according to the time interval of the acquisition of access request to access request It distinguishes, for example, 4 points to 6 points of system time is a sweep test period, then will be obtained in the sweep test period complete Portion's access request distinguishes, and is recorded in sweep test period corresponding task names table.
" detecting website vulnerability test instruction " correspondingly, in step S103 includes:Reach current test in current time When the initial time in period, website vulnerability test instruction is generated;" access request for transferring record " includes in step S103:It determines The task names table of the corresponding time interval of current test period, the access recorded according to identified task names table are asked It asks, determines transferred access request;
And " the task names table of the corresponding time interval of current test period is determined, according to identified in execution The access request that is recorded of business title table, determines transferred access request " during this, it is preferred that for each task The access request that title table is recorded then directly is transferred, and the access request transferred is marked if transferring for the first time;If It is not to transfer for the first time, then deletes the access request tested being labeled in table.
In the loophole test method of website disclosed by the embodiments of the present invention, the specific implementation procedure of step S101~S113 with Consistent disclosed in step S101~S113 in above-described embodiment, details are not described herein, refers to portion disclosed in above-described embodiment Point.
As it can be seen that the loophole test method of website provided in an embodiment of the present invention is, it can be achieved that website burden is lighter, and tests knot The comprehensive higher website vulnerability test of fruit, and proxy server by access request according to acquisition time interval into Row is distinguished, and the specific aim of Hole Detection is enhanced.
In order to it will be apparent to those skilled in that understand understanding the present invention in content, now provide a scene embodiment It is explained, the method flow diagram of the scene embodiment is as shown in Figure 5.
When user A uses one financial and economic news page of Sina's Client browse, the financial and economic news in Sina's client is clicked Hyperlink;Sina's client receives financial and economic news access address, and generating corresponding financial and economic news according to access address accesses Request, and is sent to Sina's Website server by the financial and economic news access request of generation, so that Sina's Website server is to Sina Client feedback financial and economic news content of pages;
In Sina's Website server to after Sina's client feedback financial and economic news content of pages, the loophole of Sina website is surveyed Test system carries out the website process of Hole Detection, and method flow diagram is as shown in figure 5, include the following steps:
S201, proxy server obtain the financial and economic news access request that Sina's client is sent to Sina's Website server, Sina website's site server will be given in the financial and economic news access request again;Wherein, comprising extremely in the financial and economic news access request The corresponding at least one uniform resource position mark URL link of the financial and economic news page;
S202, proxy server record proxy server and obtain financial and economic news access request;
S203, if loophole test server detects website vulnerability test instruction, the financial and economic news access for transferring record is asked It asks, at least one URL link to be measured is determined from the corresponding URL link of financial and economic news access request transferred;
The parameter of the URL link to be measured is split, is obtained for a URL link to be measured by S204, loophole test server To each fractionation parameter;
S205, loophole test server determine the controllable at least one target component of parameter value from each fractionation parameter, will The parameter value of each target component replaces with the payload using website vulnerability;
S206, loophole test server replace with the target component of payload according to parameter value, generate the URL chains to be measured Connect corresponding test URL link;
S207, loophole test server determine the corresponding financial and economic news of each URL link to be measured according to each test URL link Content of pages;
In this scene embodiment, for a URL link to be measured, the corresponding test URL link of loophole test server comparison The corresponding financial and economic news content of pages of the corresponding financial and economic news content of pages of test request and the URL link to be measured, and root The website vulnerability test result of the URL link to be measured is determined according to comparing result;Specifically, if two financial and economic news content of pages Unanimously, then illustrate the URL link to be measured without loophole;If two financial and economic news content of pages are inconsistent, illustrate the URL to be measured It links leaky.
At this point, can also generate prompt message is sent to suggestion device, which can be warning light, and warning light dodges User A can be prompted by sparkling, light or convert display color.
In conjunction with system architecture shown in figure 1, an embodiment of the present invention provides a kind of loopholes of website to test system, packet It includes:Proxy server 20, database 30 and loophole test server 40;
Proxy server 20, is sent to the access request of Website server for obtaining client, and by acquired visit It asks in request and is given to the Website server;The access request includes:The corresponding uniform resource position mark URL of Website server Link;
Database 30, for recording each access request acquired in proxy server;
If loophole test server 40 transfers the visit of record for detecting website vulnerability test instruction from database It asks request, at least one URL link to be measured is determined from the corresponding URL link of access request transferred;By each URL chains to be measured The test URL link for being revised as having loophole test statement is connect, the corresponding test URL link of each URL link to be measured is obtained;According to Each test URL link determines the website vulnerability test result of the corresponding URL link to be measured of each test URL link.
The embodiment of the present invention is sent to the access request of Website server by the client obtained during access agent, Realize the loophole test of website, therefore can be in client in the normal access process of website, getting test website vulnerability institute The URL link used, website only need to cope with normal access, and the flow burden of website is lighter.
Further, the Website page link that the URL link involved by the access request to website is covered more fully, is sent out The probability for now hiding deeper URL link is higher, may make that URL link used in test website vulnerability can be more comprehensive The most of page for covering website, promotes the comprehensive of the loophole test result of final website.As it can be seen that the embodiment of the present invention provides Website loophole test system, it can be achieved that website burden is lighter, and the comprehensive higher website vulnerability test of test result.
Optionally, Fig. 6 further illustrates the hardware component of the loophole test system of website provided in an embodiment of the present invention Schematic diagram, as shown in fig. 6, proxy server 20 may include:At least one processor 1, at least one communication interface 2, at least One memory 3 and at least one communication bus 4;In embodiments of the present invention, processor 1, communication interface 2, memory 3, logical Believe that the quantity of bus 4 can be at least one, and communication form is not limited to shown in Fig. 6, is only proxy server 20 shown in Fig. 6 A kind of optional hardware component way of realization;
In embodiments of the present invention, processor 1, communication interface 2, memory 3 complete mutual lead to by communication bus 4 Letter;
Optionally, communication interface 2 can be the interface of communication module, such as the interface of gsm module;
Processor 1 may be a central processor CPU or specific integrated circuit ASIC (Application Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present invention Road.
Memory 3 may include high-speed RAM memory, it is also possible to further include nonvolatile memory (non-volatile Memory), a for example, at least magnetic disk storage.
Wherein, the processor 1 in proxy server 20 is particularly used in:
It obtains client and is sent to the access request of Website server, and the net will be given in acquired access request Site server, and acquired each access request is recorded in database 30;The access request includes:Website server pair The uniform resource position mark URL link answered.
As shown in fig. 6, loophole test server 40 may include:At least one processor 1 ', at least one communication interface 2 ', at least one processor 3 ' and at least one communication bus 4 ';In embodiments of the present invention, processor 1 ', communication interface 2 ', Memory 3 ', communication bus 4 ' quantity can be at least one, and communication form is not limited to shown in Fig. 6, is only shown in Fig. 6 A kind of optional hardware component way of realization of loophole test server;
Association between processor 1 ', communication interface 2 ', memory 3 ' and communication bus 4 ' can refer to above description.
In embodiments of the present invention, the processor 1 ' in loophole test server 40 is particularly used in:
If detecting website vulnerability test instruction, the access request of record is transferred from database, from the access transferred It asks to determine at least one URL link to be measured in corresponding URL link;Each URL link to be measured is revised as with loophole test The test URL link of sentence obtains the corresponding test URL link of each URL link to be measured;According to each test URL link, determine each Test the website vulnerability test result of the corresponding URL link to be measured of URL link.
Above-described embodiment is that the test of the loophole of website is belonged to what different servers was realized, but in practical application mistake Cheng Zhong can be loaded into the same server in the form of process;The server can be in the loophole test for realizing website, mainly Following flow is executed, method flow diagram is as shown in Figure 7:
S301 obtains client and is sent to the access request of Website server, and will be given in acquired access request The Website server;The access request includes:The corresponding at least one uniform resource position mark URL chain of Website server It connects;
S302 records acquired each access request;
S303 transfers the access request of record, from the access request pair transferred if detecting website vulnerability test instruction At least one URL link to be measured is determined in the URL link answered;
S304, the test URL link for being revised as each URL link to be measured to have loophole test statement obtain each URL to be measured Link corresponding test URL link;
S305 determines the website vulnerability test result of each URL link to be measured according to each test URL link.
Wherein, other functions realization of server can refer to corresponding portion description above.
Optionally, an embodiment of the present invention provides a kind of server, structural schematic diagram is as shown in figure 8, include:Access generation It is true to manage module 101, logging modle 102, link determining module 103 to be measured, test link determining module 104 and loophole test result Cover half block 105;
Access agent module 101 is sent to the access request of Website server for obtaining client, and will be acquired The Website server is given in access request;The access request includes:The corresponding uniform resource locator of Website server URL link;
Logging modle 102, for recording acquired each access request;
If link determining module 103 to be measured transfers the access request of record for detecting website vulnerability test instruction, At least one URL link to be measured is determined from the corresponding URL link of access request transferred;
Test link determining module 104, for each URL link to be measured to be revised as the test with loophole test statement URL link obtains the corresponding test URL link of each URL link to be measured;
Loophole test result determining module 105, for according to each test URL link, determining that each test URL link is corresponding The website vulnerability test result of URL link to be measured.
Preferably, link determining module 103 to be measured, for being determined from the corresponding URL link of access request transferred At least one URL link to be measured, specifically includes:
Duplicate removal processing is carried out to the corresponding URL link of the access request transferred;
According to the URL link after duplicate removal processing, candidate's URL link is determined;
Classification polymerization is carried out to candidate URL link, at least one URL link to be measured is determined from classification polymerization result.
Preferably, link determining module 103 to be measured is specifically included for carrying out classification polymerization to candidate URL link:
URL link with controllable parameter in the candidate URL link of analysis, and the URL link with controllable parameter is sorted out Polymerization;
Link determining module 103 to be measured, for determining at least one URL link to be measured from classification polymerization result, specifically Including:
The URL link with controllable parameter for sorting out polymerization is determined as at least one URL link to be measured.
Server described in above-mentioned any one, it is preferred that test link determining module 104 is used for each URL chains to be measured The test URL link for being revised as having loophole test statement is connect, is specifically included:
For a URL link to be measured, the parameter of the URL link to be measured is split, obtains each fractionation parameter;
The controllable at least one target component of parameter value is determined from each fractionation parameter, and the parameter value of each target component is replaced It is changed to the payload using website vulnerability;
The target component that payload is replaced with according to parameter value generates the corresponding test URL chains of the URL link to be measured It connects.
Preferably, loophole test result determining module 105, for according to each test URL link, determining each test URL chains The website vulnerability test result for connecing corresponding URL link to be measured, specifically includes:
The corresponding test request of each test URL link is sent to Website server, is corresponded to getting each test request Feedback result;
For a URL link to be measured, according to the feedback result and the URL to be measured of the test request of corresponding test URL link The feedback result of link determines the website vulnerability test result of the URL link to be measured.
Correspondingly, functional module framework shown in Fig. 8 may be disposed in server, can be realized by the server of the invention real The loophole test function for the website that example is provided is applied, the hardware configuration of the server may include:At least one processor, at least One communication interface, at least one processor and at least one communication bus;
Association between processor, communication interface, memory and communication bus can refer to above description.
Wherein, the processor in server can be specifically used for:
It obtains client and is sent to the access request of Website server, and the net will be given in acquired access request Site server;The access request includes:The corresponding at least one uniform resource position mark URL link of the Website server;
The acquired each access request of record;
If detecting website vulnerability test instruction, the access request of record is transferred, it is corresponding from the access request transferred At least one URL link to be measured is determined in URL link;
The test URL link for being revised as each URL link to be measured to have loophole test statement obtains each URL link to be measured Corresponding test URL link;
According to each test URL link, the website vulnerability test result of each URL link to be measured is determined.
The embodiment of the present invention is sent to the access request of Website server by the client obtained during access agent, Realize the loophole test of website, therefore can be in client in the normal access process of website, getting test website vulnerability institute The URL link used, website only need to cope with normal access, and the flow burden of website is lighter.
Further, the Website page link that the URL link involved by the access request to website is covered more fully, is sent out The probability for now hiding deeper URL link is higher, may make that URL link used in test website vulnerability can be more comprehensive The most of page for covering website, promotes the comprehensive of the loophole test result of final website.As it can be seen that the embodiment of the present invention provides Server, it can be achieved that website burden is lighter, and the comprehensive higher website vulnerability test of test result.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other The difference of embodiment, just to refer each other for identical similar portion between each embodiment.For device disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related place is said referring to method part It is bright.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, depends on the specific application and design constraint of technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest range caused.

Claims (15)

1. a kind of loophole test method of website, which is characterized in that including:
It obtains client and is sent to the access request of Website server, and the website clothes will be given in acquired access request Business device;The access request includes:The corresponding at least one uniform resource position mark URL link of the Website server;
The acquired each access request of record;
If detecting website vulnerability test instruction, the access request of record is transferred, from the corresponding URL chains of access request transferred Connect at least one URL link to be measured of middle determination;
The test URL link for being revised as each URL link to be measured to have loophole test statement obtains each URL link to be measured and corresponds to Test URL link;
According to each test URL link, the website vulnerability test result of each URL link to be measured is determined.
2. the loophole test method of website according to claim 1, which is characterized in that described from the access request transferred Determine that at least one URL link to be measured includes in corresponding URL link:
Duplicate removal processing is carried out to the corresponding URL link of the access request transferred;
According to the URL link after duplicate removal processing, candidate's URL link is determined;
Classification polymerization is carried out to candidate URL link, at least one URL link to be measured is determined from classification polymerization result.
3. the loophole test method of website according to claim 2, which is characterized in that the URL chains according to after duplicate removal It connects, determines that candidate's URL link includes:
It transfers and has tested URL link table, the URL link charting of having tested has the URL for having carried out website vulnerability test Link;
URL link table is tested according to described, from the URL link after duplicate removal processing, removal has carried out website vulnerability test URL link, obtain the candidate URL link.
4. the loophole test method of website according to claim 2, which is characterized in that described to the candidate URL link Carrying out classification polymerization includes:
URL link with controllable parameter in the candidate URL link of analysis, and the not URL link of controllable parameter, will have controllable The URL link of parameter sorts out polymerization, and the URL link of not controllable parameter is sorted out polymerization;
Determine that at least one URL link to be measured includes in the polymerization result from classification:
The URL link with controllable parameter for sorting out polymerization is determined as at least one URL link to be measured.
5. according to the loophole test method of claim 1-4 any one of them website, which is characterized in that it is described will be each to be measured URL link is revised as having the test URL link of loophole test statement include:
For a URL link to be measured, the parameter of the URL link to be measured is split, obtains each fractionation parameter;
The controllable at least one target component of parameter value is determined from each fractionation parameter, and the parameter value of each target component is replaced with Using the payload of website vulnerability;
The target component that payload is replaced with according to parameter value generates the corresponding test URL link of the URL link to be measured.
6. the loophole test method of website according to claim 1, which is characterized in that it is described according to each test URL link, Determine that the website vulnerability test result of the corresponding URL link to be measured of each test URL link includes:
The corresponding test request of each test URL link is sent to the Website server, is corresponded to getting each test request Feedback result;
For a URL link to be measured, according to the feedback result and the URL link to be measured of the test request of corresponding test URL link Feedback result, determine the website vulnerability test result of the URL link to be measured.
7. the loophole test method of website according to claim 1, which is characterized in that the method further includes:
The access request for the carry out website vulnerability test transferred is marked;
The access request for transferring record includes:
Not labeled access request is transferred from the access request recorded.
8. the loophole test method of website according to claim 1, which is characterized in that the acquisition client is sent to net The access request of site server includes:
Basis basic certifications are carried out to the client to obtain the client if certification passes through and be sent to Website server Access request.
9. the loophole test method of website according to claim 1, which is characterized in that the method further includes:
The access request recorded is distinguished according to the time interval that access request obtains, it is corresponding to obtain each time interval Task names table;Wherein, the task names table record has the access request that corresponding time interval is recorded, a time zone Between a corresponding test period;
It is described to detect that website vulnerability test instruction includes:
When current time reaches the initial time of current test period, website vulnerability test instruction is generated;
The access request for transferring record includes:
The task names table for determining the corresponding time interval of current test period is recorded according to identified task names table Access request determines transferred access request.
10. the loophole test method of website according to claim 1, which is characterized in that further include:
According to the website vulnerability test result of each URL link to be measured, export the test output of each URL link to be measured as a result, so as to The website vulnerability test result of each URL link to be measured is verified;
Wherein, the test output result of a URL link to be measured includes:The URL link to be measured, the corresponding visit of the URL link to be measured Ask request, the corresponding test URL link of the URL link to be measured, the parameter of the test URL link, the test URL link is corresponding At least one of the feedback result of Website server corresponding to access request and the test URL link.
11. a kind of server, which is characterized in that including:
Access agent module is sent to the access request of Website server for obtaining client, and acquired access is asked The Website server is given in asking;The access request includes:The corresponding uniform resource position mark URL of the Website server Link;
Logging modle, for recording acquired each access request;
If link determining module to be measured transfers the access request of record, from being transferred for detecting website vulnerability test instruction The corresponding URL link of access request in determine at least one URL link to be measured;
Test link determining module, the test URL link for being revised as each URL link to be measured that there is loophole test statement, Obtain the corresponding test URL link of each URL link to be measured;
Loophole test result determining module, for according to each test URL link, determining the corresponding URL to be measured of each test URL link The website vulnerability test result of link.
12. server according to claim 11, which is characterized in that the link determining module to be measured, for from being adjusted At least one URL link to be measured is determined in the corresponding URL link of access request taken, is specifically included:
Duplicate removal processing is carried out to the corresponding URL link of the access request transferred;
According to the URL link after duplicate removal processing, candidate's URL link is determined;
Classification polymerization is carried out to candidate URL link, at least one URL link to be measured is determined from classification polymerization result.
13. according to claim 11-12 any one of them servers, which is characterized in that the test links determining module, uses In the test URL link for being revised as each URL link to be measured that there is loophole test statement, specifically include:
For a URL link to be measured, the parameter of the URL link to be measured is split, obtains each fractionation parameter;
The controllable at least one target component of parameter value is determined from each fractionation parameter, and the parameter value of each target component is replaced with Using the payload of website vulnerability;
The target component that payload is replaced with according to parameter value generates the corresponding test URL link of the URL link to be measured.
14. server according to claim 11, which is characterized in that the loophole test result determining module is used for root According to each test URL link, the website vulnerability test result of the corresponding URL link to be measured of each test URL link is determined, it is specific to wrap It includes:
The corresponding test request of each test URL link is sent to the Website server, is corresponded to getting each test request Feedback result;
For a URL link to be measured, according to the feedback result and the URL link to be measured of the test request of corresponding test URL link Feedback result, determine the website vulnerability test result of the URL link to be measured.
15. a kind of loophole of website tests system, which is characterized in that including:
Proxy server, is sent to the access request of Website server for obtaining client, and by acquired access request In be given to the Website server;The access request includes:The corresponding uniform resource position mark URL chain of the Website server It connects;
Database, for recording each access request acquired in the proxy server;
If loophole test server transfers the access of record from the database for detecting website vulnerability test instruction Request determines at least one URL link to be measured from the corresponding URL link of access request transferred;By each URL link to be measured It is revised as the test URL link with loophole test statement, obtains the corresponding test URL link of each URL link to be measured;According to each URL link is tested, determines the website vulnerability test result of the corresponding URL link to be measured of each test URL link.
CN201710197801.5A 2017-03-29 2017-03-29 Website vulnerability testing method, server and system Active CN108667770B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710197801.5A CN108667770B (en) 2017-03-29 2017-03-29 Website vulnerability testing method, server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710197801.5A CN108667770B (en) 2017-03-29 2017-03-29 Website vulnerability testing method, server and system

Publications (2)

Publication Number Publication Date
CN108667770A true CN108667770A (en) 2018-10-16
CN108667770B CN108667770B (en) 2020-12-18

Family

ID=63786108

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710197801.5A Active CN108667770B (en) 2017-03-29 2017-03-29 Website vulnerability testing method, server and system

Country Status (1)

Country Link
CN (1) CN108667770B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508548A (en) * 2018-11-19 2019-03-22 四川长虹电器股份有限公司 A kind of threat behavior gathering system and method based on emulator technology
CN109740355A (en) * 2019-01-03 2019-05-10 深圳前海微众银行股份有限公司 Vulnerability scanning method, server, system and proxy server
CN109818928A (en) * 2018-12-25 2019-05-28 北京奇安信科技有限公司 A kind of network security detection method, system, electronic equipment and medium
CN109981653A (en) * 2019-03-28 2019-07-05 上海中通吉网络技术有限公司 A kind of web vulnerability scanning method
CN111240882A (en) * 2020-01-16 2020-06-05 深圳开源互联网安全技术有限公司 Method and system for detecting abnormal state
WO2020233022A1 (en) * 2019-05-21 2020-11-26 平安科技(深圳)有限公司 Vulnerability detection method and apparatus, computer device, and storage medium
CN112306840A (en) * 2019-07-24 2021-02-02 厦门白山耘科技有限公司 URL test case generation method and device
CN114138661A (en) * 2021-12-08 2022-03-04 国家工业信息安全发展研究中心 Dynamic security detection method and system for test target

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8239952B1 (en) * 2007-02-01 2012-08-07 Mcafee, Inc. Method and system for detection of remote file inclusion vulnerabilities
CN102664876A (en) * 2012-04-10 2012-09-12 星云融创(北京)科技有限公司 Method and system for detecting network security
CN103023710A (en) * 2011-09-21 2013-04-03 阿里巴巴集团控股有限公司 Safety test system and method
CN103268361A (en) * 2013-06-07 2013-08-28 百度在线网络技术(北京)有限公司 Extracting method, device and system of hidden URL (Uniform Resource Locator) in webpage
CN104144142A (en) * 2013-05-07 2014-11-12 阿里巴巴集团控股有限公司 Web vulnerability discovery method and system
CN104468459A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 Vulnerability detection method and apparatus
CN104573520A (en) * 2013-10-09 2015-04-29 腾讯科技(深圳)有限公司 Method and device for detecting permanent type cross site scripting vulnerability
CN104765682A (en) * 2015-03-30 2015-07-08 微梦创科网络科技(中国)有限公司 Offline detection method and system for cross-site scripting vulnerability
CN104980309A (en) * 2014-04-11 2015-10-14 北京奇虎科技有限公司 Website security detecting method and device
CN105049440A (en) * 2015-08-06 2015-11-11 福建天晴数码有限公司 Method and system for detecting cross-site scripting attack injection
CN105357195A (en) * 2015-10-30 2016-02-24 深圳市深信服电子科技有限公司 Unauthorized web access vulnerability detecting method and device
CN105404816A (en) * 2015-12-24 2016-03-16 北京奇虎科技有限公司 Content-based vulnerability detection method and device
CN106302337A (en) * 2015-05-22 2017-01-04 腾讯科技(深圳)有限公司 leak detection method and device
CN106412975A (en) * 2016-09-30 2017-02-15 中国联合网络通信集团有限公司 Content charging vulnerability test methods, and apparatuses

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8239952B1 (en) * 2007-02-01 2012-08-07 Mcafee, Inc. Method and system for detection of remote file inclusion vulnerabilities
CN103023710A (en) * 2011-09-21 2013-04-03 阿里巴巴集团控股有限公司 Safety test system and method
CN102664876A (en) * 2012-04-10 2012-09-12 星云融创(北京)科技有限公司 Method and system for detecting network security
CN104144142A (en) * 2013-05-07 2014-11-12 阿里巴巴集团控股有限公司 Web vulnerability discovery method and system
CN103268361A (en) * 2013-06-07 2013-08-28 百度在线网络技术(北京)有限公司 Extracting method, device and system of hidden URL (Uniform Resource Locator) in webpage
CN104468459A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 Vulnerability detection method and apparatus
CN104573520A (en) * 2013-10-09 2015-04-29 腾讯科技(深圳)有限公司 Method and device for detecting permanent type cross site scripting vulnerability
CN104980309A (en) * 2014-04-11 2015-10-14 北京奇虎科技有限公司 Website security detecting method and device
CN104765682A (en) * 2015-03-30 2015-07-08 微梦创科网络科技(中国)有限公司 Offline detection method and system for cross-site scripting vulnerability
CN106302337A (en) * 2015-05-22 2017-01-04 腾讯科技(深圳)有限公司 leak detection method and device
CN105049440A (en) * 2015-08-06 2015-11-11 福建天晴数码有限公司 Method and system for detecting cross-site scripting attack injection
CN105357195A (en) * 2015-10-30 2016-02-24 深圳市深信服电子科技有限公司 Unauthorized web access vulnerability detecting method and device
CN105404816A (en) * 2015-12-24 2016-03-16 北京奇虎科技有限公司 Content-based vulnerability detection method and device
CN106412975A (en) * 2016-09-30 2017-02-15 中国联合网络通信集团有限公司 Content charging vulnerability test methods, and apparatuses

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
AMATUL MOHOSINA: "DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations", 《2012 IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY》 *
胡志伟: "WEB应用安全漏洞扫描系统的设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508548A (en) * 2018-11-19 2019-03-22 四川长虹电器股份有限公司 A kind of threat behavior gathering system and method based on emulator technology
CN109818928A (en) * 2018-12-25 2019-05-28 北京奇安信科技有限公司 A kind of network security detection method, system, electronic equipment and medium
CN109740355A (en) * 2019-01-03 2019-05-10 深圳前海微众银行股份有限公司 Vulnerability scanning method, server, system and proxy server
CN109981653A (en) * 2019-03-28 2019-07-05 上海中通吉网络技术有限公司 A kind of web vulnerability scanning method
CN109981653B (en) * 2019-03-28 2021-07-23 上海中通吉网络技术有限公司 Web vulnerability scanning method
WO2020233022A1 (en) * 2019-05-21 2020-11-26 平安科技(深圳)有限公司 Vulnerability detection method and apparatus, computer device, and storage medium
CN112306840A (en) * 2019-07-24 2021-02-02 厦门白山耘科技有限公司 URL test case generation method and device
CN112306840B (en) * 2019-07-24 2022-09-30 厦门白山耘科技有限公司 URL test case generation method and device
CN111240882A (en) * 2020-01-16 2020-06-05 深圳开源互联网安全技术有限公司 Method and system for detecting abnormal state
CN114138661A (en) * 2021-12-08 2022-03-04 国家工业信息安全发展研究中心 Dynamic security detection method and system for test target
CN114138661B (en) * 2021-12-08 2022-08-05 国家工业信息安全发展研究中心 Dynamic security detection method and system for test target

Also Published As

Publication number Publication date
CN108667770B (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN108667770A (en) A kind of loophole test method, server and the system of website
US10567407B2 (en) Method and system for detecting malicious web addresses
US10262142B2 (en) Systems and methods for advanced dynamic analysis scanning
CN104348803B (en) Link kidnaps detection method, device, user equipment, Analysis server and system
CN103888490B (en) A kind of man-machine knowledge method for distinguishing of full automatic WEB client side
CN110413908B (en) Method and device for classifying uniform resource locators based on website content
CN103023710B (en) A kind of safety test system and method
US8281401B2 (en) System for detecting vulnerabilities in web applications using client-side application interfaces
US8819819B1 (en) Method and system for automatically obtaining webpage content in the presence of javascript
CN103679031B (en) A kind of immune method and apparatus of file virus
US20110191664A1 (en) Systems for and methods for detecting url web tracking and consumer opt-out cookies
US20220188402A1 (en) Real-Time Detection and Blocking of Counterfeit Websites
CN109039987A (en) A kind of user account login method, device, electronic equipment and storage medium
CN103607385A (en) Method and apparatus for security detection based on browser
KR20090090685A (en) Method and system for determining vulnerability of web application
CN109450879A (en) User access activity monitoring method, electronic device and computer readable storage medium
CN106897336A (en) Web page files sending method, webpage rendering intent and device, webpage rendering system
CN107463844B (en) WEB Trojan horse detection method and system
CN104956372A (en) Determining coverage of dynamic security scans using runtime and static code analyses
CN109347882A (en) Webpage Trojan horse monitoring method, device, equipment and storage medium
CN113518077A (en) Malicious web crawler detection method, device, equipment and storage medium
CN112703496A (en) Content policy based notification of application users about malicious browser plug-ins
KR20180075881A (en) Method and Apparatus for Analyzing Web Vulnerability for Client-side
US10291492B2 (en) Systems and methods for discovering sources of online content
CN108737328A (en) A kind of browser client acts on behalf of recognition methods, system and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant