WO2020238092A1 - Link shell adding and jumping method and apparatus, and electronic device and storage medium - Google Patents
Link shell adding and jumping method and apparatus, and electronic device and storage medium Download PDFInfo
- Publication number
- WO2020238092A1 WO2020238092A1 PCT/CN2019/120603 CN2019120603W WO2020238092A1 WO 2020238092 A1 WO2020238092 A1 WO 2020238092A1 CN 2019120603 W CN2019120603 W CN 2019120603W WO 2020238092 A1 WO2020238092 A1 WO 2020238092A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- link data
- webpage link
- webpage
- dependent
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/957—Browsing optimisation, e.g. caching or content distillation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Definitions
- the present disclosure relates to the technical field of application programs, and in particular to a method, device, electronic device, and storage medium for linking and shelling jump.
- Web pages with different functions in existing applications require some blocking mechanisms for safe web browsing, which is the use of web pages, for example, a login is required to enter the inside of the web page for further access.
- the inventor realizes that this kind of login using the interception mechanism is implemented by the HTML5 program itself, which is likely to cause inconsistent HTML5 and Native experience, and it is inconvenient to configure.
- HTML5 webpages need to handle interception information similar to login. Intercept the dependent processing results, once the web page does not need to rely on, you also need to modify the HTML5 code.
- This application discloses a method, a device, an electronic device and a storage medium for link packing and redirection, which enable webpages to automatically process interception information, facilitate webpage pairing, and ensure that login interception uses a local interface to achieve experience consistency.
- a linking and shelling jump method including:
- the target page Acquiring the first webpage link data of the target page to be redirected, wherein the target page has at least one interception page associated with it, and the interception page is used to verify the access authority of the access terminal;
- the control command represented by the shell data is executed to jump to the target page through the verification of the intercepted page.
- this application also discloses a link packer jump device, including:
- Obtaining module configured to execute to obtain the first webpage link data of the target page to be jumped, wherein the target page has at least one interception page associated with it, and the interception page is used to verify the access authority of the access terminal;
- Processing module configured to perform adding shell data to the first webpage link data to generate second webpage link data
- Execution module configured to execute the control instruction represented by the shell data to jump to the target page through the verification of the intercepted page.
- the present application also discloses a computer device including a memory and a processor.
- the memory stores computer-readable instructions.
- the processor executes Steps of the link packer jump method described in any one of the above.
- the present application also discloses a storage medium storing computer-readable instructions.
- the computer-readable instructions When the computer-readable instructions are executed by one or more processors, the one or more processors execute any of the above The steps of the link packer jump method.
- the storage medium may be a non-volatile storage medium, or referred to as a non-volatile computer readable storage medium.
- the technical solutions provided by the embodiments of the present disclosure can achieve the purpose of skipping the intercepted page, automatically performing page jumps, and directly logging in, thereby ensuring the consistency of the jumped pages.
- Fig. 1 is a flow chart of a method for link packing and jumping in this application
- Fig. 2 is a schematic diagram of a method for generating second webpage link data by packing the first webpage link data according to the present application
- FIG. 3 is a schematic diagram of a method for packing the encoded first webpage link data according to the first preset format according to the present application
- Figure 4 is a schematic flow chart of the method for completing the shelling of the present application.
- FIG. 5 is a schematic diagram of a method for jumping according to the second webpage link data after being packed in this application
- Figure 6 is a block diagram of the link packer jump device of the present application.
- FIG. 7 is a block diagram of the basic structure of the computer equipment of this application.
- Fig. 1 shows a method for linking and shelling jump according to an exemplary embodiment, including:
- the target page is the page that needs to be redirected for the user to browse.
- an intercept page will be inserted, such as a login interface. You need to enter the account password correctly to see the target page The specific information of the target page or the content of the target page need to be verified.
- This intercepted page is usually accompanied by the web link data of the target page.
- the link of the target page disclosed in this application is called the first webpage link data
- the first webpage link data is a kind of URL link data
- the form of the URL link is: protocol name: //host.domain name/path/file
- the protocol includes: file local system file, http: WWW server and ftp: ftp server, etc. If you want to obtain the specified link data, you can use the crawler to monitor the data and obtain it in time.
- a feasible step includes:
- HttpDownLoadHelper class The contents of the HttpDownLoadHelper class are as follows:
- HtmlDocument doc new HtmlDocument()
- HtmlNode rootNode doc.DocumentNode
- HtmlNodeCollection titleNodes rootNode.SelectNodes("corresponding label"); storage data:
- the code of the NewsList object is as follows:
- the above is one of the specific implementation methods of obtaining the link data of the first webpage to be jumped by using the HtmlDocument object.
- there are many ways to obtain the link to be jumped any of which can be captured Just link the data of the first webpage to be jumped.
- Packing through shell data generally refers to a method of protecting program resources.
- the shell on the software surface is a piece of code that is executed before the original program.
- the code of the original program may be compressed and encrypted during the packing process. When the packed file is executed, this code as the added shell runs before the original program. It restores the compressed and encrypted code to the original program code, and then returns the execution right to the original code.
- Shells at the software level are divided into encrypted shells, compressed shells, disguised shells, multi-layered shells, etc. The purpose is to hide the real entry point of the program and prevent it from being cracked.
- the purpose is to attach the shell software to the executable file to be protected to achieve a certain purpose.
- FIG. 2 please refer to FIG. 2 for the link to the first webpage.
- the method of adding shell data to the data to generate the second webpage link data includes:
- the URL webpage is encoded so that the link data of the first webpage conforms to the url specification, because Chinese and many characters are not allowed to appear in the url in the standard url specification.
- ASCII control characters, some non-ASCII characters, some reserved characters, some unsafe characters, such as "space”, in order to prevent ambiguity, need to be converted to "+”, based on the above rules, you can follow the character corresponding to the character Encoding, which does not meet the above rules, is converted to percent encode.
- This conversion rule belongs to hexadecimal, and the result of encoding illegal characters is three bytes (%+hexadecimal characters*2). Percent encode literally points out that it uses% as the encoding mark. The essence of URL encode is to use percent encode correctly.
- the key questions for correct URL encoding are: when, what content, what filtering principle is used, and how to generate percent encoding.
- the practice was to convert the character stream into a byte stream. According to the one-to-one correspondence between ASCII characters and bytes, they can be converted to each other. Use the integer value of the corresponding ASCII character as the last two hexadecimal characters of% to form percent coding.
- the current practice includes specifying or using UTF8 by default to convert into a byte stream, and each byte is encoded into a percent encoding.
- the URL encoding of Chinese “NetEase” is %e7%bd%91%e6%98%93, and The UTF8 byte stream is e7 bd 91 e6 93, and the one-to-one correspondence can be seen.
- the encoded first webpage link data is obtained.
- the encoded first webpage link data is packed in a first preset format.
- the first preset format is a pre-preset rule for shelling, which includes sequentially superimposing the acquired layer-dependent data of the shell in the shell software that needs to be added in a certain order in a superimposed manner.
- the method for shelling the encoded first webpage link data according to a first preset format includes:
- the purpose of shelling is to attach the shell of the shell software to the executable file to be protected to achieve a certain purpose.
- the shell to be added is actually a kind of data, which is appended to the original web page link data for encapsulation .
- the dependent data here is actually a configuration parameter. When there is only one configuration parameter, directly add the configuration parameter to the original web link. If there are many configuration parameters This constitutes multiple layers of dependent data. In this application, if the shell to be added is obtained, all dependent data on the shell is actually obtained.
- the dependent data After obtaining all the dependent data of the shell to be added, the dependent data needs to be sorted, so that the dependent data is sequentially superimposed on the first webpage link data in a specific manner. Since dependent data is a configuration parameter, there may be a sequential relationship between different configuration information. Therefore, this specific way of sequentially superimposing dependent data can be sorting based on the sequential relationship between dependent data. In another embodiment, the dependent data does not have a sequential relationship, but there is a relationship between the size of the included range. Therefore, this specific way of sequentially superimposing the dependent data may be based on the dependent data included The size of the range is superimposed in order from large to small, or superimposed in sequence from small to large. In another embodiment, the dependent data is in a parallel relationship.
- a feasible solution is to arrange the dependent data in a specified manner, for example, first superimpose the dependent data related to time, and then add the dependent data related to the name. Data, and then overlay dependent data related to the address, etc.
- Another feasible solution is random sorting and stacking.
- the method of sequentially stacking dependent data on the basis of the first webpage link data to complete the shelling further includes:
- S2223 Relocate the first webpage link data to be packed according to the dependent data, and save and generate the second webpage link data.
- the encoded first webpage link data is loaded into the corresponding PE structure, and the PE structure loads the program data into the memory to facilitate address conversion and facilitate program execution. Since the PE structure stores the relevant program information of the first webpage link data in the memory, the encoded offset address of the first webpage link data can be obtained, and the offset address is in the computer After the memory is segmented, the offset of the coded address loaded by the relevant program of the first webpage link data relative to the first address of the segment after the computer memory is segmented.
- the dependent data of each layer is stored in the offset address obtained above, and then the dependent data is sequentially superimposed in a specific manner, which is equivalent to Relocate the encoded first webpage link data.
- the dependent data is superimposed, it is equivalent to the relocation of the first webpage link data.
- the relocated data is saved, and the relocated link is The data is the link data of the second webpage, and the shelling operation is completed at this time.
- the server After the shelling operation is completed, when the server receives an instruction to open the current website, the shelled second webpage link data is redirected. Further, referring to FIG. 5, the method of jumping according to the second webpage link data after being packed includes:
- S3400 Reload the decoded third webpage link data and complete the jump.
- the second preset format here is a preset format for reading the second webpage link data during the execution of the webpage jump, including but not limited to the reverse order of superimposing the dependent data, that is, When you want to jump to the second webpage link data after packing, first remove the outermost dependent data, and then sequentially remove the dependent data of the inner layer, until the first webpage link data in the encoding state is obtained , And then decode it to obtain the decoded third webpage link data, and complete the jump according to the obtained third webpage link data.
- the decoded third webpage link data here is actually unencoded
- the first webpage link data that is, after talking about encoding, packing, unpacking and decoding, it reverts to the original first webpage link, thus ensuring the consistency of the webpage. This method can also ensure that the login interception uses the local interface to Achieve experience consistency.
- the http url link by shelling and unpacking the http url link, it is finally a url link, which is convenient for jump configuration, and all the dependent information is also in the Url.
- the link is encoded, and the schema can be used to pack it.
- This url can be used for background configuration like normal url.
- the routing terminal of the application will jump to the branch with the path path of /web after receiving the shelled url link data, and take out the dependency.
- the interception order of the dependency is implemented first. When the conditions are met, the first is removed.
- This application is mainly used to redirect webpages with editing permissions, such as corporate internal webpages.
- HTTP webpages can be added with the help of local routing.
- the terminal helps to achieve the decoupling of web pages and dependencies, so as to achieve the purpose of skipping the interception page, automatically jumping to the page, and directly logging in.
- the first webpage link data before the packer and the third webpage link data after the packer The jumped pages are consistent to ensure the consistency of the jumped pages.
- this application also discloses a link packer jump device, including:
- the obtaining module 1000 configured to execute the first webpage link data configured to obtain the target page to be jumped, wherein the target page has at least one intercepted page associated with it, and the intercepted page is used to verify the access terminal Access rights;
- the first webpage link data is a kind of URL link data.
- the form of the URL link is: protocol name: //host. domain name/path/file name.
- the protocols include: file local system file, http: WWW server and ftp: ftp server If you want to obtain the specified link data, you can monitor the data by crawling and obtain it in time.
- Processing module 2000 configured to execute adding shell data to the first webpage link data to generate second webpage link data
- Shelling generally refers to a method of protecting program resources.
- the shell of the software is a piece of code that is executed before the original program.
- the code of the original program may be compressed and encrypted during the packing process. When the packed file is executed, this code as the added shell runs before the original program. It restores the compressed and encrypted code to the original program code, and then returns the execution right to the original code.
- Shells at the software level are divided into encrypted shells, compressed shells, disguised shells, multi-layered shells, etc. The purpose is to hide the real entry point of the program and prevent it from being cracked.
- the execution module 3000 is configured to execute the control instruction represented by the shell data to jump to the target page through the verification of the intercepted page.
- the server After the shelling operation is completed, when the server receives an instruction to open the current website, the shelled second webpage link data is redirected.
- the processing module includes:
- Encoding module configured to perform encoding of the first webpage link data
- Packing module configured to pack the encoded first webpage link data according to a first preset format.
- the URL webpage is encoded so that the first webpage link data conforms to the url specification, because Chinese and many characters are not allowed to appear in the url in the standard url specification.
- ASCII control characters, some non-ASCII characters, some reserved characters, some unsafe characters, such as "space”, in order to prevent ambiguity, need to be converted to "+”, based on the above rules, you can follow the character corresponding to the character Encoding, which does not meet the above rules, is converted into percent encode.
- This conversion rule belongs to hexadecimal, and the result of encoding illegal characters is three bytes (%+hexadecimal characters*2). Percent encode literally clearly points out that it uses% as an encoding mark. The essence of URL encode is to use percent encode correctly.
- the key questions for correct URL encoding are: when, what content, what filtering principle is used, and how to generate percent encoding.
- the practice was to convert the character stream into a byte stream. According to the one-to-one correspondence between ASCII characters and bytes, they can be converted to each other. Use the integer value of the corresponding ASCII character as the last two hexadecimal characters of% to form percent coding.
- the current practice includes specifying or using UTF8 by default to convert into a byte stream, and each byte is encoded into a percent encoding.
- the URL encoding of Chinese “NetEase” is %e7%bd%91%e6%98%93, and The UTF8 byte stream is e7 bd 91 e6 93, and the one-to-one correspondence can be seen.
- the encoded first webpage link data is obtained.
- the encoded first webpage link data is packed according to the first preset format.
- the first preset format is a pre-preset rule for shelling, which includes sequentially superimposing the acquired layer-dependent data of the shell in the shell software that needs to be added in a certain order.
- the shelling module includes:
- Dependency acquisition module configured to execute and acquire the dependent data of each layer of the shell to be added
- the superposition module is configured to sequentially superimpose dependent data on the basis of the first webpage link data to complete the shelling.
- the purpose of shelling is to attach the shell of the shell software to the executable file to be protected to achieve a certain purpose.
- the shell to be added is actually a kind of data, which is appended to the original web page link data for encapsulation .
- the dependent data here is actually a configuration parameter. When there is only one configuration parameter, directly add the configuration parameter to the original web link. If there are many configuration parameters This constitutes multiple layers of dependent data. In this application, if the shell to be added is acquired, all dependent data on the shell is actually acquired.
- dependent data After obtaining all the dependent data of the shell to be added, the dependent data needs to be sorted, so that the dependent data is sequentially superimposed on the first webpage link data in a specific manner. Since dependent data is a configuration parameter, there may be a sequential relationship between different configuration information. Therefore, this specific way of sequentially superimposing dependent data may be sorting based on the sequential relationship between dependent data. In another embodiment, there is no sequential relationship between the dependent data, but there is a relationship in the size of the included range. Therefore, this specific way of sequentially superimposing dependent data may be based on the dependent data included The size of the range is superimposed in order from large to small, or superimposed in sequence from small to large. In another embodiment, the dependent data are in a parallel relationship. Therefore, a feasible solution is to arrange in a specified manner, for example, to superimpose time-related dependent data first, and then add name-related dependencies Data, and then overlay dependent data related to the address, etc. Another feasible solution is random sorting and stacking.
- the overlay module includes:
- Address obtaining module configured to perform obtaining the offset address of the first webpage link data after encoding
- Storage module configured to execute storing the layer-dependent data of the shell to be added in the offset address
- the relocation module is configured to perform relocation of the first webpage link data to be packed according to the dependent data, and save and generate the second webpage link data.
- the encoded first webpage link data is loaded into the corresponding PE structure, and the PE structure loads the program data into the memory to facilitate address conversion and facilitate program execution. Since the PE structure stores the relevant program information of the first webpage link data in the memory, the encoded offset address of the first webpage link data can be obtained, and the offset address is in the computer After the memory is segmented, the offset of the coded address loaded by the relevant program of the first webpage link data relative to the first address of the segment after the computer memory is segmented.
- the dependent data of each layer is stored in the offset address obtained above, and then the dependent data is sequentially superimposed in a specific manner, which is equivalent to the encoded
- the first webpage link data is relocated.
- the relocated data is saved, and the relocated link data is the first Second, the webpage link data, and the packer operation is now complete.
- the execution module includes:
- the second webpage obtaining module configured to execute and obtain the second webpage link data
- Dependency extraction module configured to execute to extract the dependent data sequentially according to the second preset format to generate third webpage link data
- Decoding module configured to perform decoding of the third webpage link data
- Jump module configured to perform reloading of the decoded third webpage link data and complete the jump.
- the second preset format here is a preset format for reading the second webpage link data during the execution of the webpage jump, including but not limited to the reverse order of superimposing the dependent data, that is, When you want to jump to the second webpage link data after packing, first remove the outermost dependent data, and then sequentially remove the dependent data of the inner layer, until the first webpage link data in the encoding state is obtained , And then decode it to obtain the decoded third webpage link data, and complete the jump according to the obtained third webpage link data.
- the decoded third webpage link data here is actually unencoded The link data of the first webpage, after talking about encoding, shelling, unpacking, and decoding, is restored to the original link of the first webpage, thereby ensuring the consistency of the webpage.
- FIG. 7 Please refer to FIG. 7 for the basic structural block diagram of the computer equipment provided by the embodiment of the present application.
- the computer device includes a processor, a nonvolatile storage medium, a memory, and a network interface connected through a system bus.
- the non-volatile storage medium of the computer device stores an operating system, a database, and computer-readable instructions.
- the database may store control information sequences.
- the processor can realize a A kind of link packer jump method.
- the processor of the computer equipment is used to provide calculation and control capabilities, and supports the operation of the entire computer equipment.
- a computer-readable instruction may be stored in the memory of the computer device, and when the computer-readable instruction is executed by the processor, the processor may execute a link-packing jump method.
- the network interface of the computer device is used to connect and communicate with the terminal.
- FIG. 7 is only a block diagram of part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied.
- the specific computer device may Including more or fewer parts than shown in the figure, or combining some parts, or having a different arrangement of parts.
- the computer device receives the status information of the prompt behavior sent by the associated client, that is, whether the associated terminal opens the prompt and whether the lender closes the prompt task.
- the corresponding preset instruction is sent to the associated terminal, so that the associated terminal can execute corresponding operations according to the preset instruction, thereby realizing effective supervision of the associated terminal.
- the server side controls the associated terminal to continue ringing to prevent the prompt task of the associated terminal from being automatically terminated after a period of time.
- the present application also provides a storage medium storing computer-readable instructions.
- the computer-readable instructions are executed by one or more processors, the one or more processors execute the link packer described in any of the above embodiments. Jump method.
- the computer program can be stored in a computer readable storage medium. When executed, it may include the processes of the above-mentioned method embodiments.
- the aforementioned storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disc, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM), etc.
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims (20)
- 一种链接加壳跳转方法,其特征在于,包括:A method for link packing and jumping, which is characterized in that it comprises:获取待跳转的目标页面的第一网页链接数据,其中,所述目标页面具有至少一个与其伴生的拦截页面,所述拦截页面用于验证访问终端的访问权限;Acquiring the first webpage link data of the target page to be redirected, wherein the target page has at least one interception page associated with it, and the interception page is used to verify the access authority of the access terminal;对所述第一网页链接数据添加壳数据以生成第二网页链接数据;Adding shell data to the first webpage link data to generate second webpage link data;执行所述壳数据所表征的控制指令,以通过所述拦截页面的验证,跳转至所述目标页面。The control command represented by the shell data is executed to jump to the target page through the verification of the intercepted page.
- 根据权利要求1所述的链接加壳跳转方法,其特征在于,所述对所述第一网页链接数据添加壳数据以生成第二网页链接数据的方法包括:4. The link shelling jump method according to claim 1, wherein the method of adding shell data to the first webpage link data to generate the second webpage link data comprises:对所述第一网页链接数据进行编码;Encoding the first webpage link data;对编码后的所述第一网页链接数据按照第一预设格式进行加壳。Packing the encoded first webpage link data according to a first preset format.
- 根据权利要求2所述的链接加壳跳转方法,其特征在于,所述对编码后的所述第一网页链接数据按照第一预设格式进行加壳的方法包括:4. The link shelling jump method according to claim 2, wherein the method of shelling the encoded first webpage link data according to a first preset format comprises:获取待添加的壳体的各层依赖数据;Obtain the dependent data of each layer of the shell to be added;在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳。On the basis of the first webpage link data, the dependent data is sequentially superimposed to complete the shelling.
- 根据权利要求3所述的链接加壳跳转方法,其特征在于,所述在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳的方法包括:The method of linking and shelling jump according to claim 3, wherein the method of sequentially superimposing dependent data on the basis of the first webpage link data to complete the shelling comprises:获取编码后的所述第一网页链接数据的偏移地址;Acquiring the encoded offset address of the first webpage link data;将所述待添加的壳体的各层依赖数据存储在所述偏移地址中;Storing the layer-dependent data of the shell to be added in the offset address;依据所述依赖数据重定位所述待加壳的第一网页链接数据,并保存生成第二网页链接数据。Relocate the first webpage link data to be packed according to the dependent data, and save and generate the second webpage link data.
- 根据权利要求4所述的链接加壳跳转方法,其特征在于,所述通过拦截页面的验证后,跳转至所述目标页面的方法包括:The method for jumping to the link packer according to claim 4, wherein the method of jumping to the target page after verification of the intercepted page comprises:获取所述第二网页链接数据;Acquiring the second webpage link data;按照第二预设格式依次取出所述依赖数据以生成第三网页链接数据;Sequentially extracting the dependent data according to the second preset format to generate third webpage link data;对所述第三网页链接数据进行解码;Decoding the third webpage link data;重新加载解码后的所述第三网页链接数据并完成跳转。Reload the decoded third webpage link data and complete the jump.
- 根据权利要求3所述的链接加壳跳转方法,其特征在于,所述在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳,包括:The method for jumping to link packers according to claim 3, wherein the step of sequentially superposing dependent data on the basis of the link data of the first webpage to complete the packer comprises:根据依赖数据之间的先后关系进行排序;Sort according to the sequence of dependent data;根据所述先后关系的排序在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳。The dependent data is sequentially superimposed on the basis of the first webpage link data according to the sequence of the sequence to complete the shelling.
- 根据权利要求3所述的链接加壳跳转方法,其特征在于,所述在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳,包括:The method for jumping to link packers according to claim 3, wherein the step of sequentially superposing dependent data on the basis of the link data of the first webpage to complete the packer comprises:获取所述依赖数据所包含的范围的大小;Obtaining the size of the range included in the dependent data;根据各层依赖数据所包含的范围的大小,在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳。According to the size of the range included in the dependent data of each layer, the dependent data is sequentially superimposed on the first webpage link data to complete the packing.
- 一种链接加壳跳转装置,其特征在于,包括:A link packer jump device, characterized in that it comprises:获取模块:被配置为执行获取待跳转的目标页面的第一网页链接数据,其中,所述目标页面具有至少一个与其伴生的拦截页面,所述拦截页面用于验证访问终端的访问权限;Obtaining module: configured to execute to obtain the first webpage link data of the target page to be jumped, wherein the target page has at least one interception page associated with it, and the interception page is used to verify the access authority of the access terminal;处理模块:被配置为执行对所述第一网页链接数据添加壳数据以生成第二网页链接数据;Processing module: configured to perform adding shell data to the first webpage link data to generate second webpage link data;执行模块:被配置为执行所述壳数据所表征的控制指令,以通过所述拦截页面的验证,跳转至所述目标页面。Execution module: configured to execute the control instruction represented by the shell data to jump to the target page through the verification of the intercepted page.
- 根据权利要求8所述的链接加壳跳转装置,其特征在于,所述处理模块包括:The link packer jump device according to claim 8, wherein the processing module comprises:编码模块:被配置为执行对所述第一网页链接数据进行编码;Encoding module: configured to perform encoding of the first webpage link data;加壳模块:被配置为执行对编码后的所述第一网页链接数据按照第一预设格式进行加壳。Packing module: configured to pack the encoded first webpage link data according to a first preset format.
- 根据权利要求9所述的链接加壳跳转装置,其特征在于,所述加壳模块包括:The link packer jumping device according to claim 9, wherein the packer module comprises:依赖获取模块:被配置为执行获取待添加的壳体的各层依赖数据;Dependency acquisition module: configured to execute and acquire the dependent data of each layer of the shell to be added;叠加模块:被配置为执行在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳。The superposition module is configured to sequentially superimpose dependent data on the basis of the first webpage link data to complete the shelling.
- 根据权利要求10所述的链接加壳跳转装置,其特征在于,所述叠加模块包括:The link packer jump device according to claim 10, wherein the superimposing module comprises:地址获取模块:被配置为执行获取编码后的所述第一网页链接数据的偏移 地址;Address obtaining module: configured to perform obtaining the offset address of the encoded first webpage link data;存储模块:被配置为执行将所述待添加的壳体的各层依赖数据存储在所述偏移地址中;Storage module: configured to execute storing the layer-dependent data of the shell to be added in the offset address;重定位模块:被配置为执行依据所述依赖数据重定位所述待加壳的第一网页链接数据,并保存生成第二网页链接数据。The relocation module is configured to perform relocation of the first webpage link data to be packed according to the dependent data, and save and generate the second webpage link data.
- 根据权利要求11所述的链接加壳跳转装置,其特征在于,所述执行模块包括:The link packer jumping device according to claim 11, wherein the execution module comprises:第二网页获取模块:被配置为执行获取所述第二网页链接数据;The second webpage obtaining module: configured to execute and obtain the second webpage link data;依赖提取模块:被配置为执行按照第二预设格式依次取出所述依赖数据以生成第三网页链接数据;Dependency extraction module: configured to execute to extract the dependent data sequentially according to the second preset format to generate third webpage link data;解码模块:被配置为执行对所述第三网页链接数据进行解码;Decoding module: configured to perform decoding of the third webpage link data;跳转模块:被配置为执行重新加载解码后的所述第三网页链接数据并完成跳转。Jump module: configured to perform reloading of the decoded third webpage link data and complete the jump.
- 根据权利要求10所述的链接加壳跳转装置,其特征在于,所述叠加模块具体用于:The link packer jump device according to claim 10, wherein the overlay module is specifically configured to:根据依赖数据之间的先后关系进行排序;Sort according to the sequence of dependent data;根据所述先后关系的排序在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳。The dependent data is sequentially superimposed on the basis of the first webpage link data according to the sequence of the sequence to complete the shelling.
- 根据权利要求10所述的链接加壳跳转装置,其特征在于,所述叠加模块具体用于:The link packer jump device according to claim 10, wherein the overlay module is specifically configured to:获取所述依赖数据所包含的范围的大小;Obtaining the size of the range included in the dependent data;根据各层依赖数据所包含的范围的大小,在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳。According to the size of the range included in the dependent data of each layer, the dependent data is sequentially superimposed on the first webpage link data to complete the shelling.
- 一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器执行以下步骤:A computer device includes a memory and a processor. The memory stores computer readable instructions, and when the computer readable instructions are executed by the processor, the processor executes the following steps:获取待跳转的目标页面的第一网页链接数据,其中,所述目标页面具有至少一个与其伴生的拦截页面,所述拦截页面用于验证访问终端的访问权限;Acquiring the first webpage link data of the target page to be redirected, wherein the target page has at least one interception page associated with it, and the interception page is used to verify the access authority of the access terminal;对所述第一网页链接数据添加壳数据以生成第二网页链接数据;Adding shell data to the first webpage link data to generate second webpage link data;执行所述壳数据所表征的控制指令,以通过所述拦截页面的验证,跳转至所述目标页面。The control command represented by the shell data is executed to jump to the target page through the verification of the intercepted page.
- 根据权利要求15所述的计算机设备,其特征在于,所述处理器在执行所述对所述第一网页链接数据添加壳数据以生成第二网页链接数据时,具体执行以下步骤:The computer device according to claim 15, wherein when the processor executes the adding shell data to the first webpage link data to generate the second webpage link data, the processor specifically executes the following steps:对所述第一网页链接数据进行编码;Encoding the first webpage link data;对编码后的所述第一网页链接数据按照第一预设格式进行加壳。Packing the encoded first webpage link data according to a first preset format.
- 根据权利要求16所述的计算机设备,其特征在于,所述处理器在执行所述对编码后的所述第一网页链接数据按照第一预设格式进行加壳时,具体执行以下步骤:16. The computer device according to claim 16, wherein the processor specifically executes the following steps when executing the shelling of the encoded first webpage link data according to a first preset format:获取待添加的壳体的各层依赖数据;Obtain the dependent data of each layer of the shell to be added;在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳。On the basis of the first webpage link data, the dependent data is sequentially superimposed to complete the shelling.
- 根据权利要求17所述的计算机设备,其特征在于,所述处理器在执行所述在所述第一网页链接数据的基础上依次叠加依赖数据以完成加壳时,具体执行以下步骤:18. The computer device according to claim 17, wherein the processor performs the following steps when executing the step of sequentially superimposing dependent data on the basis of the first webpage link data to complete the packing:获取编码后的所述第一网页链接数据的偏移地址;Acquiring the encoded offset address of the first webpage link data;将所述待添加的壳体的各层依赖数据存储在所述偏移地址中;Storing the layer-dependent data of the shell to be added in the offset address;依据所述依赖数据重定位所述待加壳的第一网页链接数据,并保存生成第二网页链接数据。Relocate the first webpage link data to be packed according to the dependent data, and save and generate the second webpage link data.
- 根据权利要求18所述的计算机设备,其特征在于,所述处理器在执行所述通过拦截页面的验证后,跳转至所述目标页面时,具体执行以下步骤:18. The computer device according to claim 18, wherein the processor specifically executes the following steps when jumping to the target page after performing the verification of the intercepted page:获取所述第二网页链接数据;Acquiring the second webpage link data;按照第二预设格式依次取出所述依赖数据以生成第三网页链接数据;Sequentially extracting the dependent data according to the second preset format to generate third webpage link data;对所述第三网页链接数据进行解码;Decoding the third webpage link data;重新加载解码后的所述第三网页链接数据并完成跳转。Reload the decoded third webpage link data and complete the jump.
- 一种存储有计算机可读指令的存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行如权利要求1至7中任一项权利要求所述的链接加壳跳转方法的步骤。A storage medium storing computer-readable instructions that, when executed by one or more processors, cause one or more processors to execute as described in any one of claims 1 to 7 The steps of the link packer jump method.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910441327.5A CN110321501A (en) | 2019-05-24 | 2019-05-24 | Link shell adding jump method, device, electronic equipment and storage medium |
CN201910441327.5 | 2019-05-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020238092A1 true WO2020238092A1 (en) | 2020-12-03 |
Family
ID=68119108
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/120603 WO2020238092A1 (en) | 2019-05-24 | 2019-11-25 | Link shell adding and jumping method and apparatus, and electronic device and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110321501A (en) |
WO (1) | WO2020238092A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110321501A (en) * | 2019-05-24 | 2019-10-11 | 深圳壹账通智能科技有限公司 | Link shell adding jump method, device, electronic equipment and storage medium |
CN111428442B (en) * | 2020-03-25 | 2023-04-21 | 北京思特奇信息技术股份有限公司 | Data conversion method, system and storage medium without dictionary table |
CN112347490A (en) * | 2020-06-11 | 2021-02-09 | 广州锦行网络科技有限公司 | Application program shell adding method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140156613A1 (en) * | 2012-09-18 | 2014-06-05 | Squash Compression, LLC | Methods and Apparatus for Increasing the Efficiency of Electronic Data Storage and Transmission |
CN105677730A (en) * | 2015-12-29 | 2016-06-15 | 北京金山安全软件有限公司 | Method and device for reading webpage resources and electronic equipment |
CN107729106A (en) * | 2017-10-09 | 2018-02-23 | 北京京东尚科信息技术有限公司 | It is a kind of that the method and apparatus quickly redirected are realized between application component |
CN108491247A (en) * | 2018-04-10 | 2018-09-04 | 武汉斗鱼网络科技有限公司 | Method for page jump, device, terminal and computer-readable medium |
CN110321501A (en) * | 2019-05-24 | 2019-10-11 | 深圳壹账通智能科技有限公司 | Link shell adding jump method, device, electronic equipment and storage medium |
-
2019
- 2019-05-24 CN CN201910441327.5A patent/CN110321501A/en active Pending
- 2019-11-25 WO PCT/CN2019/120603 patent/WO2020238092A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140156613A1 (en) * | 2012-09-18 | 2014-06-05 | Squash Compression, LLC | Methods and Apparatus for Increasing the Efficiency of Electronic Data Storage and Transmission |
CN105677730A (en) * | 2015-12-29 | 2016-06-15 | 北京金山安全软件有限公司 | Method and device for reading webpage resources and electronic equipment |
CN107729106A (en) * | 2017-10-09 | 2018-02-23 | 北京京东尚科信息技术有限公司 | It is a kind of that the method and apparatus quickly redirected are realized between application component |
CN108491247A (en) * | 2018-04-10 | 2018-09-04 | 武汉斗鱼网络科技有限公司 | Method for page jump, device, terminal and computer-readable medium |
CN110321501A (en) * | 2019-05-24 | 2019-10-11 | 深圳壹账通智能科技有限公司 | Link shell adding jump method, device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110321501A (en) | 2019-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020238092A1 (en) | Link shell adding and jumping method and apparatus, and electronic device and storage medium | |
US11593484B2 (en) | Proactive browser content analysis | |
CN104462959B (en) | A kind of method for reinforcing and protecting, server and the system of Android application | |
CN102473171B (en) | Information about local machine is conveyed to browser application | |
Lekies et al. | 25 million flows later: large-scale detection of DOM-based XSS | |
CN104965712B (en) | Application program method for reinforcing and protecting, device and mobile terminal | |
US20160203087A1 (en) | Method for providing security for common intermediate language-based program | |
CN111143869B (en) | Application package processing method and device, electronic equipment and storage medium | |
CN104392181A (en) | SO file protection method and device and android installation package reinforcement method and system | |
US9811676B1 (en) | Systems and methods for securely providing information external to documents | |
CN103530535A (en) | Shell adding and removing method for Android platform application program protection | |
US20130227640A1 (en) | Method and apparatus for website scanning | |
CN107104924B (en) | Verification method and device for website backdoor file | |
CN106815524B (en) | Malicious script file detection method and device | |
CN105959324A (en) | Regular matching-based network attack detection method and apparatus | |
CN106569856A (en) | Method and device of loading application view resource file | |
Magazinius et al. | Polyglots: crossing origins by crossing formats | |
CN104809391B (en) | Buffer overflow attack detection device, method and security protection system | |
CN108197440A (en) | A kind of Code obfuscation method, equipment and computer readable storage medium | |
CN108512898A (en) | File push method, apparatus, computer equipment and storage medium | |
WO2016058291A1 (en) | Method and system for packaging mobile application | |
KR102001046B1 (en) | Apparatus and Method of Providing Security, and Apparatus and Method of Executing Security for Common Intermediate Language | |
CN104980464B (en) | A kind of network request processing method, network server and network system | |
Moshchuk et al. | Content-based isolation: rethinking isolation policy design on client systems | |
CN106293724A (en) | A kind of many game managements and edition control method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19931038 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19931038 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 18/03/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19931038 Country of ref document: EP Kind code of ref document: A1 |