CN104765682A - Offline detection method and system for cross-site scripting vulnerability - Google Patents

Offline detection method and system for cross-site scripting vulnerability Download PDF

Info

Publication number
CN104765682A
CN104765682A CN201510144357.1A CN201510144357A CN104765682A CN 104765682 A CN104765682 A CN 104765682A CN 201510144357 A CN201510144357 A CN 201510144357A CN 104765682 A CN104765682 A CN 104765682A
Authority
CN
China
Prior art keywords
test
safety
site scripting
test environment
cross site
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510144357.1A
Other languages
Chinese (zh)
Other versions
CN104765682B (en
Inventor
姜楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weimeng Chuangke Network Technology China Co Ltd
Original Assignee
Weimeng Chuangke Network Technology China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weimeng Chuangke Network Technology China Co Ltd filed Critical Weimeng Chuangke Network Technology China Co Ltd
Priority to CN201510144357.1A priority Critical patent/CN104765682B/en
Publication of CN104765682A publication Critical patent/CN104765682A/en
Application granted granted Critical
Publication of CN104765682B publication Critical patent/CN104765682B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an offline detection method and system for a cross-site scripting vulnerability. The offline detection method includes that a control device acquires the IP of a function test server and a function test project virtualization website HOST; a resource isolating device carries out resource isolation on a target function test environment, packs standard resource isolating mirror images and deploys in a safety test environment; a transmitting device deployed in the target function test environment transmits network flow which conforms to the function test project to a scheduling device; the scheduling device carries out data encapsulation on the transmitted network flow and sends the encapsulated test data to a test device; the test device sends a safety test request to the safety test environment, analyzes the page returned from the safety test environment to find out the cross-site scripting safety vulnerability, and sends to the control device; the control device confirms the safety test project of the safety vulnerability according to the IP of the function test server and the function test project HOST. The offline detection method and system for the cross-site scripting vulnerability enable the coverage and automatic degree of the safety test to be improved.

Description

Detection method and system under the line of cross site scripting leak
Technical field
The present invention relates to computer security technique field, particularly relate to the method and system that cross site scripting leak (XSS) detects.
Background technology
At present in the safety test work of Web procedural item, safety test personnel, except carrying out safety test to program, also will have sufficient understanding to the logic of program, could cover the safety test of program as far as possible.The coverage rate of safety test, all the time lower than the coverage rate of functional test, causes testing all possible program branches, occurs security breaches on line.
The technical scheme of prior art one is as follows:
Obtain the source code also extraction scripted code wherein of target pages, travel through all scripted codes, utilize predefined dirty data entrance to obtain the variable that in scripted code, all dirty data entrances and dirty data entrance transmit; Again travel through all scripted codes, obtain the output function in described scripted code, and the parameter extracting output function is mated with the variable of dirty data entrance and the transmission of dirty data entrance, if can mate, then define leak and exist.
The shortcoming of prior art one is:
Present Web2.0 website becomes main flow, and a large amount of webpages is all the webpage dynamically generated by scripted code, and cross site scripting may be present in webpage Anywhere, and carrying out traveling through only by source code is can not carry out whole Hole Detection covering to current webpage.
The defense technique of inter-network station script XSS is multifarious on network, being to obtain all webpages that there is leak, easily causing wrong report and failing to report by carrying out simple coupling to output dirty data.XSS: inter-network station script (Cross-sitescripting, usually referred to as XSS or cross site scripting or cross-site scripting attack) is that a kind of security breaches of website application program are attacked, and is the one of code injection.It allows malicious user by code injection on webpage, and other users will be affected when watching webpage.This kind of attack typically includes HTML and user side script.
The technical scheme of prior art two is as follows:
Capture all URL of the page (URL(uniform resource locator), Uniform Resource Locator) based on reptile mode and carry out checking attack test.
The shortcoming of prior art two is:
1, reptile may capture the page useless in a large number, and cannot customized web page; Like this, on the function point having interpolation, deletion, retouching operation, use multiple validating vulnerability script can produce a large amount of junk datas, and normal content can be deleted; This not only consumes a large amount of time, and can reduce service logic coverage rate.
2, the snatch rate of reptile is uncontrollable, and the page of a lot of Web 2.0 needs just to produce solicit operation alternately through browser resolves or needs now, and these URL cannot be got by reptile.
3, to sum up, the test coverage of reptile can not reach the safety test demand under current technology.
Summary of the invention
The object of the invention is to, detection method and system under a kind of line of cross site scripting leak are provided, functional test and safety test to be isolated, promote the coverage rate of safety test.
For reaching above-mentioned purpose, one aspect of the present invention provides detection method under a kind of line of cross site scripting leak, and it comprises:
Automated detection system front-end control device receives safety test instruction, obtains IP and the virtual network address HOST of functional test project of functional test server;
Automatic test environmental resource spacer assembly accepts the steering order of described automated detection system front-end control device, and objective function test environment is carried out resource isolation, and standardized resource isolation mirror image of packing, is deployed in safety test environment;
Network traffics retransmission unit receives the steering order of described automated detection system front-end control device, is deployed in objective function test environment, the network traffics meeting functional test project are forwarded to distributed scheduling device;
The network traffics that network traffics retransmission unit on each objective function test environment forwards are carried out data encapsulation by described distributed scheduling device, and by the packet delivery after encapsulation to cross site scripting leak safety instrumentation;
Described cross site scripting leak safety instrumentation receive described distributed scheduling device divide the encapsulation sent after packet, the network traffics of functional test project are met described in being reduced into by packet after described encapsulation, transmission meets the safety test request of the network traffics of functional test project extremely by the described safety test environment of resource isolation described in carrying, then after the page that described safety test environment returns being resolved, find out cross site scripting security breaches, and the security breaches of discovery are sent to described automated detection system front-end control device;
Described automated detection system front-end control device, according to the IP of described functional test server and functional test project HOST, determines the safety test project that described security breaches belong to.
For reaching above-mentioned purpose, the present invention provides on the other hand detection system under a kind of line of cross site scripting leak, and it comprises:
Automated detection system front-end control device, for receiving safety test instruction, obtains IP and the virtual network address HOST of functional test project of functional test server;
Automatic test environmental resource spacer assembly, for receiving the steering order of described automated detection system front-end control device, carries out resource isolation by objective function test environment, and standardized resource isolation mirror image of packing, is deployed in safety test environment;
Network traffics retransmission unit, for receiving the steering order of described automated detection system front-end control device, being deployed in objective function test environment, the network traffics meeting functional test project is forwarded to distributed scheduling device;
Described distributed scheduling device, carries out data encapsulation for the network traffics forwarded by the network traffics retransmission unit on each objective function test environment, and by the packet delivery after encapsulation to cross site scripting leak safety instrumentation;
Described cross site scripting leak safety instrumentation, the packet after the encapsulation sent is divided for receiving described distributed scheduling device, the network traffics of functional test project are met described in being reduced into by packet after described encapsulation, transmission meets the safety test request of the network traffics of functional test project extremely by the described safety test environment of resource isolation described in carrying, then after the page that described safety test environment returns being resolved, find out cross site scripting security breaches, and the cross site scripting security breaches of discovery are sent to described automated detection system front-end control device,
Described automated detection system front-end control device, also for according to the IP of described functional test server and functional test project HOST, determines the safety test project that described security breaches belong to.
The Advantageous Effects of technique scheme provided by the invention is: owing to have employed detection method under the cross site scripting leak line based on resource isolation, whole automation mechanized operation is achieved across the safety test of level script under making line, and dirty data does not impact objective function test environment, safety test and functional test can be made synchronously to carry out, substantially increase coverage rate and the automaticity of safety test.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the functional block diagram of detection system under the line of a kind of cross site scripting leak based on resource isolation of embodiments of the invention;
Fig. 2 is the process flow diagram of detection method under the line of the cross site scripting leak based on resource isolation of embodiments of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The coverage rate of functional test, by capturing the test access request of functional test personnel, is transferred directly to safety test, greatly improves the coverage rate of safety test by embodiments of the invention.And by the resource isolation of test environment, functional test and safety test are isolated, the dirty data of safety test does not affect the environment of functional test, and the computational resource and human resources that safety test consumes can be reduced further.While functional test, carry out safety test, improve the progress of safety test.Below by as follows for the explanation of technical terms related in embodiments of the invention:
HOST: software test use virtual network address, by IP and domain name write server /etc/hosts realize.By the domain name that this server access writes, can point to/etc/hosts file in the IP that binds with this domain name.
Resource isolation: resource isolation technology uses LXC (Linux Container), based on the lightweight virtualization solution of Process Container (Processcontainer).Various application program and their running environment that relies on are packaged into the container/image of standard, and then are published on different platforms and run.
Embodiment one
Fig. 1 is the functional block diagram of detection system under the line of a kind of cross site scripting leak based on resource isolation of embodiments of the invention.As shown in Figure 1, this system comprises: automated detection system front-end control device 110, automatic test environmental resource spacer assembly 120, network traffics retransmission unit 130, distributed scheduling device 140, cross site scripting leak safety instrumentation 150.
Automated detection system front-end control device 110, for receiving safety test instruction, obtains IP and the functional test project HOST (virtual network address) of functional test server.During concrete enforcement, automated detection system front-end control device 110 receives the instruction of safety test personnel, the IP of input function testing server and functional test project HOST, safety test bullets (optional).Namely this device 110 can send specific steering order, controls other devices and completes required movement.And receive the leak data that cross site scripting leak safety instrumentation 150 sends, according to the uniqueness of IP and HOST, vulnerability information is directed in the safety test project of ownership, realizes whole robotization.Wherein, the effect of safety test bullets is the particular content for determining safety test project.
Automatic test environmental resource spacer assembly 120, for accepting the steering order of automated detection system front-end control device 110, carries out resource isolation by objective function test environment, and standardized resource isolation mirror image of packing, is deployed in safety test environment.By under the control of automated detection system front-end control device 110, objective function test environment is carried out resource isolation and objective function test environment is carried out standardization packing, be sent on safety test server and install, thus achieving the resource isolation of test environment, safety test does not cause data contamination to functional test.
Network traffics retransmission unit 130, for receiving the steering order of automated detection system front-end control device 110, be deployed in objective function test environment and (be namely deployed on the server of functional test), the network traffics meeting functional test project are forwarded to distributed scheduling device 140.
Distributed scheduling device 140, network traffics for being forwarded by the network traffics retransmission unit 130 on each objective function test environment carry out data encapsulation, and the test data after encapsulation is distributed to cross site scripting leak safety instrumentation 150 (namely distributing test request).Here Reseal refers to the data module being encapsulated as and meeting the process of cross site scripting leak safety instrumentation 150.Specifically, encapsulation refers to the http request of functional test, is packaged into the packet of cross site scripting leak safety instrumentation interface needs according to certain rule.This packet can be reduced into http request by cross site scripting leak safety instrumentation 150 again, and is sent to by the safety test environment of resource isolation by safety test request.
Cross site scripting leak safety instrumentation 150, for receiving the packet after the 140 points of encapsulation sent of distributed scheduling device, packet after this encapsulation is reduced into the network traffics meeting functional test project, send and carry this safety test request meeting the network traffics of functional test project extremely by the safety test environment of resource isolation, then after the page that safety test environment returns being resolved, find out cross site scripting security breaches, the cross site scripting security breaches of discovery are sent to automated detection system front-end control device 110; Details by leak are sent to automated detection system front-end control device 110.
Automated detection system front-end control device 110, also for according to the IP of functional test server and functional test project HOST, determines the safety test project that security breaches belong to.Particularly, leak, according to HOST uniqueness under single test environment IP, is directly targeted to safety test bullets, and shows in front end page by this automated detection system front-end control device 110, waits for and manually checking.
Further, this automatic test environmental resource spacer assembly 120, specifically can be used for objective function test environment to carry out the virtualized resource isolation of container.During concrete enforcement, objective function test environment is carried out virtualized resource isolation by automatic test environmental resource spacer assembly 120, and packing be sent to safety test server on carry out the virtual deployment of container, by objective function test environment complete copy to safety test server.Wherein, above-mentioned objective function test environment can be the test environment built based on linux system.
Further, this cross site scripting leak safety instrumentation 150, specifically can be used for carrying out DOM (Document Object Model to the webpage source code data that safety test environment returns, DOM Document Object Model) tree detection, if find the target spot dom tree having increased safety test newly, then judge/think to there are cross site scripting security breaches, otherwise, there are not cross site scripting security breaches.The advantage of this detection mode is that detection speed is fast, and accuracy is high, and the webpage source code parsing module that cross site scripting leak safety instrumentation 150 comprises carries dom tree and detects, and can provide the testing result of dom tree after being parsed simultaneously.
Further, this cross site scripting leak safety instrumentation 150, the network traffics meeting functional test project also for obtaining after reduction treatment carry out safety test data splicing, and the data after splicing are carried in safety test request the safety test environment be sent to by resource isolation.In the present embodiment, the detection mode of cross site scripting leak is the (URL everywhere at http bag, referer, cookie) etc., whether the safety test data (term is payload in the industry) that splicing test uses, exist corresponding test oracle content judge whether to there is cross site scripting leak by finding in the page returned.
The Advantageous Effects of technique scheme is:
Owing to have employed detection system under the cross site scripting leak line based on resource isolation, whole automation mechanized operation is achieved across the safety test of level script under making line, and dirty data does not impact objective function test environment, safety test and functional test can be made synchronously to carry out, substantially increase coverage rate and the automaticity of safety test.
Embodiment two
The embodiment provides detection method under a kind of line of the cross site scripting leak based on resource isolation, thus safety test under automatically completing line.
Fig. 2 is the process flow diagram of detection method under the line of the cross site scripting leak based on resource isolation of embodiments of the invention.In conjunction with consulting Fig. 1 and Fig. 2, the method comprises following treatment step:
Step 210: automated detection system front-end control device receives safety test instruction, obtains IP and the functional test project HOST (virtual network address) of functional test server;
Particularly, in this step, the HOST of the bullets of the functional test of program, test environment and server ip can be input in automated detection system front-end control device by functional test personnel.
Step 220: automatic test environmental resource spacer assembly accepts the steering order of automated detection system front-end control device, and objective function test environment is carried out resource isolation, standardized resource isolation mirror image of packing, is deployed in safety test environment;
Step 230: network traffics retransmission unit receives the steering order of automated detection system front-end control device, is deployed in objective function test environment, the network traffics meeting functional test project are forwarded to distributed scheduling device; This objective function test environment comprises the test environment built based on linux system.
Step 240: the network traffics that the network traffics retransmission unit on each objective function test environment forwards are carried out data encapsulation by distributed scheduling device, and by the packet delivery after encapsulation to cross site scripting leak safety instrumentation;
Step 250: cross site scripting leak safety instrumentation reception distributed scheduling device divides the packet after the encapsulation sent, packet after this encapsulation is reduced into the above-mentioned network traffics meeting functional test project, send and carry this safety test request meeting the network traffics of functional test project extremely by the safety test environment of resource isolation, then after the page that safety test environment returns being resolved, find out cross site scripting security breaches, and the security breaches of discovery are sent to automated detection system front-end control device;
Step 260: automated detection system front-end control device, according to the IP of functional test server and functional test project HOST, determines the safety test project that security breaches belong to.Safety test result is also sent to the front end page of safety test by system.The result of safety test personnel to robotization safety test checks again, confirms errorless, safety test result is carried out filing and repairing.
Preferably, in a step 220, the process that objective function test environment carries out resource isolation comprises by automatic test environmental resource spacer assembly: objective function test environment is carried out the virtualized resource isolation of container by automatic test environmental resource spacer assembly.Also namely use resource isolation technology in this step, the environment of functional test is carried out the virtualized resource isolation of container, and the resource isolation mirror image of packing is installed to safety test environment.
Preferably, the concrete processing procedure of step 250 can comprise: carry out dom tree detection to the webpage source code data that safety test environment returns, if find the target spot dom tree having increased safety test newly, then it is determined that the presence of cross site scripting security breaches, otherwise, there are not cross site scripting security breaches.The advantage of this detection mode is that detection speed is fast, and accuracy is high.
Further, the method also comprises the steps: that cross site scripting leak safety instrumentation carries out safety test data splicing to the above-mentioned network traffics meeting functional test project after reduction, and the data after splicing is carried in safety test request and is sent to safety test environment.
The Advantageous Effects of technique scheme is:
Owing to have employed detection method under the cross site scripting leak line based on resource isolation, whole automation mechanized operation is achieved across the safety test of level script under making line, and dirty data does not impact objective function test environment, safety test and functional test can be made synchronously to carry out, substantially increase coverage rate and the automaticity of safety test.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required general hardware platform by software and realize, and can certainly pass through hardware, or the combination of the two is implemented.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this software module or computer software product can be stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform method described in each embodiment of the present invention.Storage medium can be the storage medium of other form any known in random access memory (RAM), internal memory, ROM (read-only memory) (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field.
Above embodiment only in order to the technical scheme of the embodiment of the present invention to be described, is not intended to limit; Although be described in detail the embodiment of the present invention with reference to previous embodiment, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of each embodiment technical scheme of the embodiment of the present invention.

Claims (10)

1. a detection method under the line of cross site scripting leak, is characterized in that, comprising:
Automated detection system front-end control device receives safety test instruction, obtains IP and the virtual network address HOST of functional test project of functional test server;
Automatic test environmental resource spacer assembly receives the steering order of described automated detection system front-end control device, and objective function test environment is carried out resource isolation, and standardized resource isolation mirror image of packing, is deployed in safety test environment;
Network traffics retransmission unit receives the steering order of described automated detection system front-end control device, is deployed in objective function test environment, the network traffics meeting functional test project are forwarded to distributed scheduling device;
The network traffics that network traffics retransmission unit on each objective function test environment forwards are carried out data encapsulation by described distributed scheduling device, and by the packet delivery after encapsulation to cross site scripting leak safety instrumentation;
Described cross site scripting leak safety instrumentation receive described distributed scheduling device divide the encapsulation sent after packet, the network traffics of functional test project are met described in being reduced into by packet after described encapsulation, transmission meets the safety test request of the network traffics of functional test project extremely by the described safety test environment of resource isolation described in carrying, then after the page that described safety test environment returns being resolved, find out cross site scripting security breaches, and the security breaches of discovery are sent to described automated detection system front-end control device;
Described automated detection system front-end control device, according to the IP of described functional test server and functional test project HOST, determines the safety test project that described security breaches belong to.
2. method according to claim 1, is characterized in that, the process that objective function test environment carries out resource isolation comprises by described automatic test environmental resource spacer assembly:
Objective function test environment is carried out the virtualized resource isolation of container by described automatic test environmental resource spacer assembly.
3. method according to claim 1, is characterized in that, after the page that described safety test environment returns is resolved by described cross site scripting leak safety instrumentation, the process finding out cross site scripting security breaches comprises:
The detection of DOM Document Object Model dom tree is carried out to the webpage source code data that described safety test environment returns, if find the target spot dom tree having increased safety test newly, then it is determined that the presence of cross site scripting security breaches, otherwise, there are not cross site scripting security breaches.
4. method according to claim 1, it is characterized in that, described method also comprises: described cross site scripting leak safety instrumentation carries out safety test data splicing to the network traffics meeting functional test project described in after reduction, and the data after splicing is carried in described safety test request and is sent to described safety test environment.
5. method according to claim 1, is characterized in that, described objective function test environment comprises the test environment built based on linux system.
6. a detection system under the line of cross site scripting leak, is characterized in that, comprising:
Automated detection system front-end control device, for receiving safety test instruction, obtains IP and the virtual network address HOST of functional test project of functional test server;
Automatic test environmental resource spacer assembly, for receiving the steering order of described automated detection system front-end control device, carries out resource isolation by objective function test environment, and standardized resource isolation mirror image of packing, is deployed in safety test environment;
Network traffics retransmission unit, for receiving the steering order of described automated detection system front-end control device, being deployed in objective function test environment, the network traffics meeting functional test project is forwarded to distributed scheduling device;
Described distributed scheduling device, carries out data encapsulation for the network traffics forwarded by the network traffics retransmission unit on each objective function test environment, and by the packet delivery after encapsulation to cross site scripting leak safety instrumentation;
Described cross site scripting leak safety instrumentation, the packet after the encapsulation sent is divided for receiving described distributed scheduling device, the network traffics of functional test project are met described in being reduced into by packet after described encapsulation, transmission meets the safety test request of the network traffics of functional test project extremely by the described safety test environment of resource isolation described in carrying, then after the page that described safety test environment returns being resolved, find out cross site scripting security breaches, and the cross site scripting security breaches of discovery are sent to described automated detection system front-end control device,
Described automated detection system front-end control device, also for according to the IP of described functional test server and functional test project HOST, determines the safety test project that described security breaches belong to.
7. system according to claim 6, is characterized in that, described automatic test environmental resource spacer assembly, specifically for objective function test environment is carried out the virtualized resource isolation of container.
8. system according to claim 6, it is characterized in that, described cross site scripting leak safety instrumentation, webpage source code data specifically for returning described safety test environment carry out the detection of DOM Document Object Model dom tree, if find the target spot dom tree having increased safety test newly, then it is determined that the presence of cross site scripting security breaches, otherwise, there are not cross site scripting security breaches.
9. system according to claim 6, it is characterized in that, described cross site scripting leak safety instrumentation, also for carrying out safety test data splicing to the network traffics meeting functional test project described in after reduction, and the data after splicing are carried in described safety test request are sent to described safety test environment.
10. system according to claim 6, is characterized in that described objective function test environment comprises the test environment built based on linux system.
CN201510144357.1A 2015-03-30 2015-03-30 Detection method and system under the line of cross site scripting leak Active CN104765682B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510144357.1A CN104765682B (en) 2015-03-30 2015-03-30 Detection method and system under the line of cross site scripting leak

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510144357.1A CN104765682B (en) 2015-03-30 2015-03-30 Detection method and system under the line of cross site scripting leak

Publications (2)

Publication Number Publication Date
CN104765682A true CN104765682A (en) 2015-07-08
CN104765682B CN104765682B (en) 2017-08-25

Family

ID=53647526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510144357.1A Active CN104765682B (en) 2015-03-30 2015-03-30 Detection method and system under the line of cross site scripting leak

Country Status (1)

Country Link
CN (1) CN104765682B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105447088A (en) * 2015-11-06 2016-03-30 杭州掘数科技有限公司 Volunteer computing based multi-tenant professional cloud crawler
CN105740705A (en) * 2015-12-28 2016-07-06 哈尔滨安天科技股份有限公司 LXC container-based host defense method and system
CN106469083A (en) * 2015-08-19 2017-03-01 三星Sds株式会社 Container mirror-image safety inspection method and its device
CN108182363A (en) * 2017-12-25 2018-06-19 哈尔滨安天科技股份有限公司 Detection method, system and the storage medium of embedded office documents
CN108667770A (en) * 2017-03-29 2018-10-16 腾讯科技(深圳)有限公司 A kind of loophole test method, server and the system of website
CN108875368A (en) * 2017-05-10 2018-11-23 北京金山云网络技术有限公司 A kind of safety detection method, apparatus and system
CN110266737A (en) * 2019-07-30 2019-09-20 杭州安恒信息技术股份有限公司 A kind of leak detection method, device, equipment and medium that cross-domain resource is shared
CN111625824A (en) * 2020-05-15 2020-09-04 深圳开源互联网安全技术有限公司 IAST-based security test method and device, electronic device and storage medium
CN113485905A (en) * 2021-02-26 2021-10-08 杜自然 Test method, device, equipment and computer storage medium in data transaction

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901307A (en) * 2009-05-27 2010-12-01 北京启明星辰信息技术股份有限公司 Method and device for detecting whether database is attacked by cross-site script
CN101964025A (en) * 2009-07-23 2011-02-02 中联绿盟信息技术(北京)有限公司 XSS (Cross Site Scripting) detection method and device
US20120260344A1 (en) * 2009-12-15 2012-10-11 Ofer Maor Method and system of runtime analysis

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901307A (en) * 2009-05-27 2010-12-01 北京启明星辰信息技术股份有限公司 Method and device for detecting whether database is attacked by cross-site script
CN101964025A (en) * 2009-07-23 2011-02-02 中联绿盟信息技术(北京)有限公司 XSS (Cross Site Scripting) detection method and device
US20120260344A1 (en) * 2009-12-15 2012-10-11 Ofer Maor Method and system of runtime analysis

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106469083A (en) * 2015-08-19 2017-03-01 三星Sds株式会社 Container mirror-image safety inspection method and its device
CN106469083B (en) * 2015-08-19 2021-08-24 三星Sds株式会社 Container mirror image safety inspection method and device thereof
CN105447088B (en) * 2015-11-06 2019-04-09 杭州掘数科技有限公司 A kind of multi-tenant profession cloud crawler system based on volunteer computing mode
CN105447088A (en) * 2015-11-06 2016-03-30 杭州掘数科技有限公司 Volunteer computing based multi-tenant professional cloud crawler
CN105740705A (en) * 2015-12-28 2016-07-06 哈尔滨安天科技股份有限公司 LXC container-based host defense method and system
CN108667770B (en) * 2017-03-29 2020-12-18 腾讯科技(深圳)有限公司 Website vulnerability testing method, server and system
CN108667770A (en) * 2017-03-29 2018-10-16 腾讯科技(深圳)有限公司 A kind of loophole test method, server and the system of website
CN108875368A (en) * 2017-05-10 2018-11-23 北京金山云网络技术有限公司 A kind of safety detection method, apparatus and system
CN108182363A (en) * 2017-12-25 2018-06-19 哈尔滨安天科技股份有限公司 Detection method, system and the storage medium of embedded office documents
CN108182363B (en) * 2017-12-25 2022-01-07 安天科技集团股份有限公司 Detection method, system and storage medium of embedded office document
CN110266737A (en) * 2019-07-30 2019-09-20 杭州安恒信息技术股份有限公司 A kind of leak detection method, device, equipment and medium that cross-domain resource is shared
CN110266737B (en) * 2019-07-30 2021-05-07 杭州安恒信息技术股份有限公司 Method, device, equipment and medium for detecting vulnerability of cross-domain resource sharing
CN111625824A (en) * 2020-05-15 2020-09-04 深圳开源互联网安全技术有限公司 IAST-based security test method and device, electronic device and storage medium
CN113485905A (en) * 2021-02-26 2021-10-08 杜自然 Test method, device, equipment and computer storage medium in data transaction
CN113485905B (en) * 2021-02-26 2023-09-05 杜自然 Test method, device, equipment and computer storage medium in data transaction

Also Published As

Publication number Publication date
CN104765682B (en) 2017-08-25

Similar Documents

Publication Publication Date Title
CN104765682A (en) Offline detection method and system for cross-site scripting vulnerability
US20220035930A1 (en) System and method for identifying network security threats and assessing network security
US10826872B2 (en) Security policy for browser extensions
CN105430011B (en) A kind of method and apparatus detecting distributed denial of service attack
US10165004B1 (en) Passive detection of forged web browsers
US20130111595A1 (en) Detection of dom-based cross-site scripting vulnerabilities
US10757135B2 (en) Bot characteristic detection method and apparatus
CN105320883A (en) File secure loading implementation method and apparatus
CN104079557A (en) CC attack protection method and device
RU2726032C2 (en) Systems and methods for detecting malicious programs with a domain generation algorithm (dga)
KR101369743B1 (en) Apparatus and method for verifying referer
CN112398781B (en) Attack testing method, host server and control server
CN103701816B (en) Perform the scan method and scanning means of the server of Denial of Service attack
CN103117893A (en) Monitor method and device of network accessing behaviour and client device
CN104202206A (en) Message processing device and method
US20230115046A1 (en) Network security system for preventing unknown network attacks
CN103067384A (en) Threat processing method, system, linkage client, safety equipment and host
CN110545277A (en) Risk processing method and device applied to security system, computing equipment and medium
CN110602134B (en) Method, device and system for identifying illegal terminal access based on session label
CN104811507A (en) IP address acquiring method and IP address acquiring device
CN104486292A (en) Enterprise-resource safety-access control method, device and system
US11748460B2 (en) Procedural code generation for challenge code
CN104052630A (en) Method and system for executing verification on website
US10250621B1 (en) Automatic extraction of indicators of compromise from multiple data sources accessible over a network
CN112231045A (en) Method for detecting health of safety container, electronic device and medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant