CN104881608A - XSS vulnerability detection method based on simulating browser behavior - Google Patents

XSS vulnerability detection method based on simulating browser behavior Download PDF

Info

Publication number
CN104881608A
CN104881608A CN201510262308.8A CN201510262308A CN104881608A CN 104881608 A CN104881608 A CN 104881608A CN 201510262308 A CN201510262308 A CN 201510262308A CN 104881608 A CN104881608 A CN 104881608A
Authority
CN
China
Prior art keywords
url
page
list
xss
ghost
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510262308.8A
Other languages
Chinese (zh)
Other versions
CN104881608B (en
Inventor
王丹
刘源
赵文兵
杜金莲
苏航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN201510262308.8A priority Critical patent/CN104881608B/en
Publication of CN104881608A publication Critical patent/CN104881608A/en
Application granted granted Critical
Publication of CN104881608B publication Critical patent/CN104881608B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to an XSS vulnerability detection method based on simulating a browser behavior. A crawler module is contained with a core of a browser, JavaScript can be analyzed and Ajax can be loaded by simulating the browser behavior to obtain a hidden type decanting point of a page. Compared with a traditional condition, the system increases covering of the decanting point greatly. A vulnerability detection module uses a black-box detection method to detect whether an abnormal condition occurs on the page or not by simulating the browser behavior after the attack vector is improved, namely whether the browser executes a page script or not can be detected, whether a current decanting point has vulnerability or not is judged directly, and the method is more accurate compared with the traditional method. In addition, the method is exploited through the python language, the advantages of being easy to maintain and being easy to conduct secondary development are possessed, and a great application value is possessed to the detection and research of the XSS vulnerability.

Description

A kind of XSS leak detection method based on simulation browser behavior
Technical field
The present invention relates to a kind of XSS leak detection method based on simulation browser behavior, belong to computer software cross site scripting leak field.
Background technology
In recent years, along with widely using of Web application, Web safety problem also becomes increasingly conspicuous.In 2013 the ten large Web application safety risks that OWASP announces, cross site scripting leak XSS (Cross Site Scripting) comes in third, this show XSS leak become current all kinds of websites need jointly faced by one of common security risk.
The generation of XSS leak is not verifying owing to being employed program from the insincere data of user, and be reflected back browser and do not carry out encoding or escape when process, when causing browser engine to perform code.A lot of website have ignored necessary input validation on stream, and lack enough securities, such website is just easy to be attacked by cross-site scripting.Malicious script can be submitted to the Web page that there is XSS leak by usual assailant, when client user browses this page, script can resolve execution by viewed device automatically, reach extension horse, go fishing, steal user Cookie, kidnap the objects such as user Web behavior, therefore, the detection of XSS leak is very important.
Usually, the place that may there is XSS leak in Web page is called decanting point.How in a large amount of page, finding potential decanting point and carrying out detecting is one of key of taking precautions against XSS leak, is also a numerous and diverse job simultaneously.In today that web site contents becomes increasingly abundant, manual detection decanting point is obviously unpractical, and needs to adopt automatic mode as far as possible.Web crawlers is important basic function for network automated test tool, it can from an initial URL, by the content of analyzing web page, related algorithm is used to find new URL and constantly circulation crawl webpage, until meet certain termination condition, thus obtain a large amount of pages to find decanting point.After finding decanting point, testing tool constructs attack test request again and sends to targeted sites, and judges whether to there is leak according to the echo message of targeted sites.
Research at present for robotization XSS Hole Detection instrument is not also very sufficient, traditional method is all crawl the page with static reptile, by obtain targeted sites bibliographic structure, the source code of each page is resolved, form information is wherein extracted, to reach the object finding decanting point.But decanting point is probably hidden in the dynamic content of webpage, needing by user operation, as clicked certain button, making browser resolves JavaScript or loading Ajax to generate.Tradition reptile, due to cannot simulation browser behavior, be difficult to resolve JavaScript or load Ajax, thus have ignored concealed decanting point.Simultaneously when page parsing, they also need to extract whole list content, the attribute obtaining list submits to the mode of data to submit vector of attack to analyze to server, more complicated, and can not the echo message of dynamically evaluating objects website in Hole Detection, therefore may not necessarily judge whether XSS leak exists.
Summary of the invention
The present invention adopts performance analysis, detects XSS leak, designed and Implemented the reptile framework based on Ghost.py storehouse by behavior when checking web application operation.This system framework uses Black-box Testing to judge that the accuracy rate whether XSS leak exists is higher.
For reaching above goal of the invention, the technical solution used in the present invention is a kind of XSS leak detection method based on simulation browser behavior, and this method is write in Windows 64 systems by python language completely, and Windows 64 systems are normally run.Meanwhile, this method has stronger universal and support other operating system.
Wherein, the system that a kind of XSS leak detection method based on simulation browser behavior realizes comprises reptile module, the large module of Hole Detection module two; This two large module contains again some submodules to realize Core Feature, wherein:
(1) reptile module comprises page exploration module and web analysis module two submodules, and two submodules use Ghost.py as browser engine jointly, shares url list and also operates on it.The page is explored module and is realized exploring the page to function, and web analysis module then realizes web analysis function.The page explores the depth-first reptile that module uses recurrence, and constantly circulation captures webpage stored in URL queue, until all accessed by the same area page under one's name, thus obtains a large amount of pages to find decanting point; Web analysis module extracts the URL link of the page from URL queue, and by complete for page dynamic load, and the event in triggering page is to obtain new URL and the decanting point of JavaSricpt or Ajax generation.Wherein, new URL also stored in URL queue, can wait for that the page explores the access of module.
The step of web analysis module practical function comprises,
1) collection of event, finds in webpage and may resolve JavaScript and load the click event of Ajax and trigger;
2) URL collects, and new URL is put into url list to be visited and is used for exploring the page;
3) decanting point is collected, for Hole Detection afterwards.
(2) Hole Detection module: this module comprises automatic detection module and leak judge module two submodules, two submodules use Ghost.py as browser engine jointly, automatic detection module is to decanting point automatic filling vector of attack, the Cheat Sheet that the vector of attack adopted provides for RSnake, it comprises the multiple vector of attack walking around XSS inspection.After these vector of attacks through design are submitted to, execution result is transferred to leak judge module to judge, if there is leak, the page can perform one and eject the script reminding frame, its content is XSS, whether the wait_for_alert () function check now provided based on Ghost.py engine has is reminded frame to occur, can detect webpage and whether perform script, directly judge that whether current decanting point is leaky.
Before the exploration page, also need to carry out web analysis, by complete for page dynamic load, and the event in triggering page is to obtain new URL and the decanting point of JavaSricpt or Ajax generation.The API that load page is wherein provided by Ghost.py completes,
Native system uses the Beautiful Soup storehouse of Python to complete web analysis.Beautiful Soup is the resolver of the HTML/XML that is write with Python, in order to process mark lack of standardization and to generate parsing tree, and provides simple navigation conventional again, the operation of search and amendment parsing tree.
In sum, in order to carry out Aulomatizeted Detect better, native system achieves the function of following two aspects: 1. can resolve JavaScript and load Ajax to obtain the framework of the network enabled reptile operation of concealed decanting point in the page.2. by submitting to vector of attack to judge the high efficiency method whether XSS leak exists.
This core library comprises re, pywebfuzz, ghost, bs4, pySide, pyQt, and these storehouses are run in the operating system of all main flows, therefore well realizes cross-platform transplanting.
This system adopts python language development completely, has and is easy to safeguard and carry out the feature of secondary development, has very important using value to the detection of XSS leak and research.
Accompanying drawing explanation
Fig. 1 overall system framework (by module).
Fig. 2 URL transaction module designs.
Fig. 3 Hole Detection flow scheme design.
Embodiment
We's ratio juris is the Black-box Testing to server based on Ghost.py, and it is made up of reptile module and Hole Detection module two parts.System architecture as shown in Figure 1.
1.1 reptile modules
Reptile module realizes exploring page function and web analysis function.The reptile exploring the page uses the depth-priority-searching method of recurrence in this paper, only excavates the same area page under one's name.This arthmetic statement is as shown in algorithm 1.
The depth-first recursive algorithm that algorithm 1. page is explored
Input: initial website URL
Export: to input all same domain name page URL that URL crawls for starting point
1. depth capacity MAX_DEPTH is set;
2. current depth depth=0 is set;
If 3. current depth is greater than depth capacity, terminate; Otherwise, perform step 4;
4. access current URL;
5. obtain all URL of the page stored in URL_List;
6., if URL_List is empty, terminate; Otherwise perform step 7;
Using URL next in URL_List as current URL, current depth adds 1, performs step 3;
Before the exploration page, also need to carry out web analysis, by complete for page dynamic load, and the event in triggering page is to obtain new URL and the decanting point of JavaSricpt or Ajax generation.The API that load page is wherein provided by Ghost.py completes,
Web analysis mainly completes three functions, and one is that event is collected, and finds in webpage and may resolve JavaScript and load the click event of Ajax and trigger; Two is that URL collects, and new URL is put into url list to be visited and is used for exploring the page; Three is that decanting point is collected, for Hole Detection afterwards.
Native system uses the Beautiful Soup storehouse of Python to complete web analysis.Beautiful Soup is the resolver of the HTML/XML that is write with Python, and it can well process mark lack of standardization and generate parsing tree, and provides simple navigation conventional again, the operation of search and amendment parsing tree.
(1) trigger event
During trigger event, use Beautiful Soup library searching with the label of event attribute, use Ghost.py analog subscriber clicking trigger event afterwards.Browser resolves JavaScript may be made after event is clicked and load Ajax, producing the change of DOM element or the redirect of URL, take this different modes to tackle.If jump to new URL, store current URL and the page before returning, produce DOM element and then need again to find whether occurred new event, till no longer producing DOM element, step such as algorithm 2 describes:
Algorithm 2. page DOM element deployment algorithm
Input: ask the page HTML code obtained for the first time
Export: the page HTML code after expansion
1. obtain all labels containing event stored in tag_list, remove the label repeated;
2. next label of not accessing in tag_list is clicked in simulation;
3. by this label stored in visit [], be labeled as and accessed;
4., if page jump, perform step 5; Otherwise, perform step 6;
5. by the page URL after redirect stored in URL_List, perform step 2;
If DOM element changes, perform step 1;
In this way, webpage constantly can be launched, to reach the object finding concealed decanting point.
(2) URL is added
URL hyperlink is generally present in the href attribute of <a> label, for the <a> label in HTML, the value of its href attribute can be the relative of any effective document or absolute URL, comprises fragment identifier and JavaScript code section.When general user clicks the content in <a> label, the URL that browser is specified except jumping to href attribute, also may perform the list of JavaScript expression formula, method sum functions.
Traditional web crawlers only adopts the form of the general URL of matching regular expressions, misses the page and decanting point so possibly, so native system is by the Ghost.py storehouse with browser engine, carries out multiple process, as shown in Figure 2 to the value of href.Normalization function carries out string processing for different situations, converts thereof into the form of general URL.If the URL after conversion is not in lists, excavate being stored to url list for the page afterwards.
1.2 Hole Detection modules
(1) Hole Detection
Native system employing Black-box Testing method detects target list and whether there is XSS leak.The basic skills of Hole Detection be use RSnake to provide Cheat Sheet as vector of attack to fill in list and to submit to.This Cheat Sheet comprises the multiple vector of attack can walking around XSS inspection, as shown in Figure 2.
After these vector of attacks through design are submitted to, if there is leak, then the page can perform one and eject the script reminding frame, its content is XSS, whether the wait_for_alert () now provided by Ghost.py is detected to have and reminds frame to occur, namely detect webpage and whether perform script, directly judge that whether current decanting point is leaky.When using the method, if ejected dialog box, and containing the data that have a stain in dialog box, then necessarily there is XSS leak in current form.The implementation of Hole Detection as shown in Figure 3.
(2) list and decanting point thereof is searched
If submit some lists to, need to mark the position of this list in dom tree, CSS attribute selector is used to find it afterwards, first find all lists in html document and be stored in array, be labeled as form [0], form [1], find input [0] in form [0] afterwards, input [1] in form [1], input [2], its name attribute is stored in two-dimensional array, due to the attribute uniquely needed when name attribute is and submits request to, so other attribute need not be preserved.
(3) Auto-writing submission form
The function filling in list using Ghost.py to provide herein fills in XSS vector of attack on list hurdle:
ghost.set_field_value("input[name=%s]"%name,xss)
In addition, Ghost.py can also simulate JavaScript statement and carrys out submission form:
ghost.evaluate("document.querySelectorAll('form')[%d]['submit']();"%form_i),expect_loading=True)
Likely there is restriction input length in list, does not allow the Front End Authentication such as some unallowable instruction digits, cause vector of attack not submit to.These checking events are present in the attribute of list, need simulation JavaScript statement to be removed by these attributes.
document.querySelectorAll('input[type=submit]')[0].removeAttribute('onclick');
document.querySelectorAll('input[type=submit]')[0].removeAttribute('onfocus');
Concrete steps such as the algorithm 3 of his-and-hers watches single operation afterwards describes:
Algorithm 3. automatic filling vector of attack is submitted to
Input: the two-dimensional array storing list and decanting point thereof
Export: Hole Detection result
1. traversal preserves the xss_rsnake array of whole XSS vector of attack;
2. each user in list is inputted out, fill with current attack vector;
3. submission form;
4. judge whether to there is XSS leak according to leak detection method, if existed, perform step 5; Otherwise perform step 1;
5. store the position of leak in DOM, current page URL and out of Memory;
6. terminate;
Some vector of attacks through design of table 1

Claims (1)

1. based on an XSS leak detection method for simulation browser behavior, it is characterized in that: this method is based on the Black-box Testing to server of Ghost.py, and it is made up of reptile module and Hole Detection module two parts;
1.1 reptile modules
Reptile module realizes exploring page function and web analysis function; The reptile exploring the page uses the depth-priority-searching method of recurrence in this paper, only excavates the same area page under one's name; This arthmetic statement is as shown in algorithm 1;
The depth-first recursive algorithm that algorithm 1. page is explored
Input: initial website URL
Export: to input all same domain name page URL that URL crawls for starting point
1. depth capacity MAX_DEPTH is set;
2. current depth depth=0 is set;
If 3. current depth is greater than depth capacity, terminate; Otherwise, perform step 4;
4. access current URL;
5. obtain all URL of the page stored in URL_List;
6., if URL_List is empty, terminate; Otherwise perform step 7;
Using URL next in URL_List as current URL, current depth adds 1, performs step 3;
Before the exploration page, also need to carry out web analysis, by complete for page dynamic load, and the event in triggering page is to obtain new URL and the decanting point of JavaSricpt or Ajax generation; The API that load page is wherein provided by Ghost.py completes,
Web analysis mainly completes three functions, and one is that event is collected, and finds in webpage and may resolve JavaScript and load the click event of Ajax and trigger; Two is that URL collects, and new URL is put into url list to be visited and is used for exploring the page; Three is that decanting point is collected, for Hole Detection afterwards;
This method uses the Beautiful Soup storehouse of Python to complete web analysis; Beautiful Soup is the resolver of the HTML/XML that is write with Python, and it can well process mark lack of standardization and generate parsing tree, and provides simple navigation conventional again, the operation of search and amendment parsing tree;
(1) trigger event
During trigger event, use Beautiful Soup library searching with the label of event attribute, use Ghost.py analog subscriber clicking trigger event afterwards; Browser resolves JavaScript may be made after event is clicked and load Ajax, producing the change of DOM element or the redirect of URL, take this different modes to tackle; If jump to new URL, store current URL and the page before returning, produce DOM element and then need again to find whether occurred new event, till no longer producing DOM element, step such as algorithm 2 describes:
Algorithm 2. page DOM element deployment algorithm
Input: ask the page HTML code obtained for the first time
Export: the page HTML code after expansion
1. obtain all labels containing event stored in tag_list, remove the label repeated;
2. next label of not accessing in tag_list is clicked in simulation;
3. by this label stored in visit [], be labeled as and accessed;
4., if page jump, perform step 5; Otherwise, perform step 6;
5. by the page URL after redirect stored in URL_List, perform step 2;
If DOM element changes, perform step 1;
In this way, webpage constantly can be launched, to reach the object finding concealed decanting point;
(2) URL is added
URL hyperlink is generally present in the href attribute of <a> label, for the <a> label in HTML, the value of its href attribute can be the relative of any effective document or absolute URL, comprises fragment identifier and JavaScript code section; When general user clicks the content in <a> label, the URL that browser is specified except jumping to href attribute, also may perform the list of JavaScript expression formula, method sum functions;
Traditional web crawlers only adopts the form of the general URL of matching regular expressions, misses the page and decanting point so possibly, so native system is by the Ghost.py storehouse with browser engine, carries out multiple process to the value of href; Normalization function carries out string processing for different situations, converts thereof into the form of general URL; If the URL after conversion is not in lists, excavate being stored to url list for the page afterwards;
1.2 Hole Detection modules
(1) Hole Detection
This method employing Black-box Testing method detects target list and whether there is XSS leak; The basic skills of Hole Detection be use RSnake to provide Cheat Sheet as vector of attack to fill in list and to submit to; This Cheat Sheet comprises the multiple vector of attack can walking around XSS inspection;
After these vector of attacks through design are submitted to, if there is leak, then the page can perform one and eject the script reminding frame, its content is XSS, whether the wait_for_alert () now provided by Ghost.py is detected to have and reminds frame to occur, namely detect webpage and whether perform script, directly judge that whether current decanting point is leaky; When using the method, if ejected dialog box, and containing the data that have a stain in dialog box, then necessarily there is XSS leak in current form;
(2) list and decanting point thereof is searched
If submit some lists to, need to mark the position of this list in dom tree, CSS attribute selector is used to find it afterwards, first find all lists in html document and be stored in array, be labeled as form [0], form [1], find input [0] in form [0] afterwards, input [1] in form [1], input [2], its name attribute is stored in two-dimensional array, due to the attribute uniquely needed when name attribute is and submits request to, so other attribute need not be preserved;
(3) Auto-writing submission form
The function filling in list using Ghost.py to provide herein fills in XSS vector of attack on list hurdle:
ghost.set_field_value("input[name=%s]"%name,xss)
In addition, Ghost.py can also simulate JavaScript statement and carrys out submission form:
ghost.evaluate(
"document.querySelectorAll('form')[%d]['submit']();"%form_i),expect_loading=True)
Likely there is restriction input length in list, does not allow the Front End Authentication such as some unallowable instruction digits, cause vector of attack not submit to; These checking events are present in the attribute of list, need simulation JavaScript statement to be removed by these attributes;
document.querySelectorAll('input[type=submit]')[0].removeAttribute('onclick');
document.querySelectorAll('input[type=submit]')[0].removeAttribute('onfocus');
Concrete steps such as the algorithm 3 of his-and-hers watches single operation afterwards describes:
Algorithm 3. automatic filling vector of attack is submitted to
Input: the two-dimensional array storing list and decanting point thereof
Export: Hole Detection result
1. traversal preserves the xss_rsnake array of whole XSS vector of attack;
2. each user in list is inputted out, fill with current attack vector;
3. submission form;
4. judge whether to there is XSS leak according to leak detection method, if existed, perform step 5; Otherwise perform step 1;
5. store the position of leak in DOM, current page URL and out of Memory;
6. terminate.
CN201510262308.8A 2015-05-21 2015-05-21 A kind of XSS leak detection methods based on simulation browser behavior Expired - Fee Related CN104881608B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510262308.8A CN104881608B (en) 2015-05-21 2015-05-21 A kind of XSS leak detection methods based on simulation browser behavior

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510262308.8A CN104881608B (en) 2015-05-21 2015-05-21 A kind of XSS leak detection methods based on simulation browser behavior

Publications (2)

Publication Number Publication Date
CN104881608A true CN104881608A (en) 2015-09-02
CN104881608B CN104881608B (en) 2018-03-16

Family

ID=53949098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510262308.8A Expired - Fee Related CN104881608B (en) 2015-05-21 2015-05-21 A kind of XSS leak detection methods based on simulation browser behavior

Country Status (1)

Country Link
CN (1) CN104881608B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105243019A (en) * 2015-10-27 2016-01-13 北京神州绿盟信息安全科技股份有限公司 Method and apparatus for detecting python code bugs
CN105430002A (en) * 2015-12-18 2016-03-23 北京奇虎科技有限公司 Vulnerability detection method and device
CN106022135A (en) * 2016-02-23 2016-10-12 北京工业大学 Automatic detection system capable of dynamically determining XSS vulnerability
CN106845248A (en) * 2017-01-18 2017-06-13 北京工业大学 A kind of XSS leak detection methods based on state transition graph
CN107085686A (en) * 2017-03-24 2017-08-22 深圳市九州安域科技有限公司 A kind of detection method and its system of interactive XSS leaks
CN107103241A (en) * 2017-03-15 2017-08-29 广西科技大学 A kind of method of testing for automatically generating storage-type XSS attack vector
CN107103242A (en) * 2017-05-11 2017-08-29 北京安赛创想科技有限公司 The acquisition methods and device of data
CN107147645A (en) * 2017-05-11 2017-09-08 北京安赛创想科技有限公司 The acquisition methods and device of network security data
CN107294918A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of fishing webpage detection method and device
CN107506649A (en) * 2017-08-25 2017-12-22 福建中金在线信息科技有限公司 A kind of leak detection method of html web page, device and electronic equipment
CN107844701A (en) * 2016-09-21 2018-03-27 南京大学 A kind of cross-site scripting attack detection method for input of analyzing and make a variation based on program
CN111767542A (en) * 2020-02-06 2020-10-13 北京沃东天骏信息技术有限公司 Unauthorized detection method and device
CN111859387A (en) * 2019-04-25 2020-10-30 北京九州正安科技有限公司 Automatic construction method for Android platform software vulnerability model
CN112738127A (en) * 2021-01-08 2021-04-30 西安邮电大学 Web-based website and host vulnerability detection system and method thereof
CN113612745A (en) * 2021-07-23 2021-11-05 苏州浪潮智能科技有限公司 Vulnerability detection method, system, equipment and medium
CN114629688A (en) * 2022-02-22 2022-06-14 中国人民解放军国防科技大学 File uploading vulnerability mining method and system based on dynamic test
CN115221529A (en) * 2022-09-14 2022-10-21 杭州天谷信息科技有限公司 Method and system for injecting abnormity of front-end webpage

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964025A (en) * 2009-07-23 2011-02-02 中联绿盟信息技术(北京)有限公司 XSS (Cross Site Scripting) detection method and device
CN102999420A (en) * 2011-09-13 2013-03-27 阿里巴巴集团控股有限公司 XSS (Cross Site Scripting) testing method and XSS testing system based on DOM (Document Object Model)
CN103026684A (en) * 2010-07-22 2013-04-03 国际商业机器公司 Cross-site scripting attack protection
US8949990B1 (en) * 2007-12-21 2015-02-03 Trend Micro Inc. Script-based XSS vulnerability detection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8949990B1 (en) * 2007-12-21 2015-02-03 Trend Micro Inc. Script-based XSS vulnerability detection
CN101964025A (en) * 2009-07-23 2011-02-02 中联绿盟信息技术(北京)有限公司 XSS (Cross Site Scripting) detection method and device
CN103026684A (en) * 2010-07-22 2013-04-03 国际商业机器公司 Cross-site scripting attack protection
CN102999420A (en) * 2011-09-13 2013-03-27 阿里巴巴集团控股有限公司 XSS (Cross Site Scripting) testing method and XSS testing system based on DOM (Document Object Model)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105243019A (en) * 2015-10-27 2016-01-13 北京神州绿盟信息安全科技股份有限公司 Method and apparatus for detecting python code bugs
CN105430002A (en) * 2015-12-18 2016-03-23 北京奇虎科技有限公司 Vulnerability detection method and device
CN106022135A (en) * 2016-02-23 2016-10-12 北京工业大学 Automatic detection system capable of dynamically determining XSS vulnerability
CN107294918A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of fishing webpage detection method and device
CN107844701A (en) * 2016-09-21 2018-03-27 南京大学 A kind of cross-site scripting attack detection method for input of analyzing and make a variation based on program
CN106845248A (en) * 2017-01-18 2017-06-13 北京工业大学 A kind of XSS leak detection methods based on state transition graph
CN107103241A (en) * 2017-03-15 2017-08-29 广西科技大学 A kind of method of testing for automatically generating storage-type XSS attack vector
CN107085686A (en) * 2017-03-24 2017-08-22 深圳市九州安域科技有限公司 A kind of detection method and its system of interactive XSS leaks
CN107147645A (en) * 2017-05-11 2017-09-08 北京安赛创想科技有限公司 The acquisition methods and device of network security data
CN107103242A (en) * 2017-05-11 2017-08-29 北京安赛创想科技有限公司 The acquisition methods and device of data
CN107147645B (en) * 2017-05-11 2020-05-05 北京安赛创想科技有限公司 Method and device for acquiring network security data
CN107506649A (en) * 2017-08-25 2017-12-22 福建中金在线信息科技有限公司 A kind of leak detection method of html web page, device and electronic equipment
CN111859387A (en) * 2019-04-25 2020-10-30 北京九州正安科技有限公司 Automatic construction method for Android platform software vulnerability model
CN111767542A (en) * 2020-02-06 2020-10-13 北京沃东天骏信息技术有限公司 Unauthorized detection method and device
CN112738127A (en) * 2021-01-08 2021-04-30 西安邮电大学 Web-based website and host vulnerability detection system and method thereof
CN112738127B (en) * 2021-01-08 2023-04-07 西安邮电大学 Web-based website and host vulnerability detection system and method thereof
CN113612745A (en) * 2021-07-23 2021-11-05 苏州浪潮智能科技有限公司 Vulnerability detection method, system, equipment and medium
CN114629688A (en) * 2022-02-22 2022-06-14 中国人民解放军国防科技大学 File uploading vulnerability mining method and system based on dynamic test
CN114629688B (en) * 2022-02-22 2024-03-15 中国人民解放军国防科技大学 File uploading vulnerability mining method and system based on dynamic test
CN115221529A (en) * 2022-09-14 2022-10-21 杭州天谷信息科技有限公司 Method and system for injecting abnormity of front-end webpage
CN115221529B (en) * 2022-09-14 2022-12-27 杭州天谷信息科技有限公司 Method and system for injecting abnormity of front-end webpage

Also Published As

Publication number Publication date
CN104881608B (en) 2018-03-16

Similar Documents

Publication Publication Date Title
CN104881608A (en) XSS vulnerability detection method based on simulating browser behavior
CN104881607A (en) XSS vulnerability detection method based on simulating browser behavior
US8065667B2 (en) Injecting content into third party documents for document processing
CN106022135A (en) Automatic detection system capable of dynamically determining XSS vulnerability
Gupta et al. PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications
CN103559235B (en) A kind of online social networks malicious web pages detection recognition methods
CN101964025B (en) XSS detection method and equipment
CN102436563B (en) Method and device for detecting page tampering
US20110173178A1 (en) Method and system for obtaining script related information for website crawling
CN107832622B (en) Leak detection method, device, computer equipment and storage medium
CN105678170A (en) Method for dynamically detecting cross site scripting (XSS) bugs
CN102156832B (en) Security defect detection method for Firefox expansion
CN104572777B (en) Webpage loading method and device based on UIWebView component
CN101751530B (en) Method for detecting loophole aggressive behavior and device
CN106022132A (en) Real-time webpage Trojan detection method based on dynamic content analysis
US20230106266A1 (en) Indexing Access Limited Native Applications
CN102591965A (en) Method and device for detecting black chain
WO2022063133A1 (en) Sensitive information detection method and apparatus, and device and computer-readable storage medium
Mitropoulos et al. Time present and time past: analyzing the evolution of JavaScript code in the wild
CN108694325A (en) The condition discriminating apparatus of the discriminating conduct and specified type website of specified type website
Brisset et al. Erratum: Leveraging flexible tree matching to repair broken locators in web automation scripts
Liu et al. A XSS vulnerability detection approach based on simulating browser behavior
CN110719344B (en) Domain name acquisition method and device, electronic equipment and storage medium
CN103390129A (en) Method and device for detecting security of uniform resource locator
CN108200191B (en) Utilize the client dynamic URL associated script character string detection system of perturbation method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180316

Termination date: 20210521