CN104881608A - XSS vulnerability detection method based on simulating browser behavior - Google Patents
XSS vulnerability detection method based on simulating browser behavior Download PDFInfo
- Publication number
- CN104881608A CN104881608A CN201510262308.8A CN201510262308A CN104881608A CN 104881608 A CN104881608 A CN 104881608A CN 201510262308 A CN201510262308 A CN 201510262308A CN 104881608 A CN104881608 A CN 104881608A
- Authority
- CN
- China
- Prior art keywords
- url
- page
- list
- xss
- ghost
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to an XSS vulnerability detection method based on simulating a browser behavior. A crawler module is contained with a core of a browser, JavaScript can be analyzed and Ajax can be loaded by simulating the browser behavior to obtain a hidden type decanting point of a page. Compared with a traditional condition, the system increases covering of the decanting point greatly. A vulnerability detection module uses a black-box detection method to detect whether an abnormal condition occurs on the page or not by simulating the browser behavior after the attack vector is improved, namely whether the browser executes a page script or not can be detected, whether a current decanting point has vulnerability or not is judged directly, and the method is more accurate compared with the traditional method. In addition, the method is exploited through the python language, the advantages of being easy to maintain and being easy to conduct secondary development are possessed, and a great application value is possessed to the detection and research of the XSS vulnerability.
Description
Technical field
The present invention relates to a kind of XSS leak detection method based on simulation browser behavior, belong to computer software cross site scripting leak field.
Background technology
In recent years, along with widely using of Web application, Web safety problem also becomes increasingly conspicuous.In 2013 the ten large Web application safety risks that OWASP announces, cross site scripting leak XSS (Cross Site Scripting) comes in third, this show XSS leak become current all kinds of websites need jointly faced by one of common security risk.
The generation of XSS leak is not verifying owing to being employed program from the insincere data of user, and be reflected back browser and do not carry out encoding or escape when process, when causing browser engine to perform code.A lot of website have ignored necessary input validation on stream, and lack enough securities, such website is just easy to be attacked by cross-site scripting.Malicious script can be submitted to the Web page that there is XSS leak by usual assailant, when client user browses this page, script can resolve execution by viewed device automatically, reach extension horse, go fishing, steal user Cookie, kidnap the objects such as user Web behavior, therefore, the detection of XSS leak is very important.
Usually, the place that may there is XSS leak in Web page is called decanting point.How in a large amount of page, finding potential decanting point and carrying out detecting is one of key of taking precautions against XSS leak, is also a numerous and diverse job simultaneously.In today that web site contents becomes increasingly abundant, manual detection decanting point is obviously unpractical, and needs to adopt automatic mode as far as possible.Web crawlers is important basic function for network automated test tool, it can from an initial URL, by the content of analyzing web page, related algorithm is used to find new URL and constantly circulation crawl webpage, until meet certain termination condition, thus obtain a large amount of pages to find decanting point.After finding decanting point, testing tool constructs attack test request again and sends to targeted sites, and judges whether to there is leak according to the echo message of targeted sites.
Research at present for robotization XSS Hole Detection instrument is not also very sufficient, traditional method is all crawl the page with static reptile, by obtain targeted sites bibliographic structure, the source code of each page is resolved, form information is wherein extracted, to reach the object finding decanting point.But decanting point is probably hidden in the dynamic content of webpage, needing by user operation, as clicked certain button, making browser resolves JavaScript or loading Ajax to generate.Tradition reptile, due to cannot simulation browser behavior, be difficult to resolve JavaScript or load Ajax, thus have ignored concealed decanting point.Simultaneously when page parsing, they also need to extract whole list content, the attribute obtaining list submits to the mode of data to submit vector of attack to analyze to server, more complicated, and can not the echo message of dynamically evaluating objects website in Hole Detection, therefore may not necessarily judge whether XSS leak exists.
Summary of the invention
The present invention adopts performance analysis, detects XSS leak, designed and Implemented the reptile framework based on Ghost.py storehouse by behavior when checking web application operation.This system framework uses Black-box Testing to judge that the accuracy rate whether XSS leak exists is higher.
For reaching above goal of the invention, the technical solution used in the present invention is a kind of XSS leak detection method based on simulation browser behavior, and this method is write in Windows 64 systems by python language completely, and Windows 64 systems are normally run.Meanwhile, this method has stronger universal and support other operating system.
Wherein, the system that a kind of XSS leak detection method based on simulation browser behavior realizes comprises reptile module, the large module of Hole Detection module two; This two large module contains again some submodules to realize Core Feature, wherein:
(1) reptile module comprises page exploration module and web analysis module two submodules, and two submodules use Ghost.py as browser engine jointly, shares url list and also operates on it.The page is explored module and is realized exploring the page to function, and web analysis module then realizes web analysis function.The page explores the depth-first reptile that module uses recurrence, and constantly circulation captures webpage stored in URL queue, until all accessed by the same area page under one's name, thus obtains a large amount of pages to find decanting point; Web analysis module extracts the URL link of the page from URL queue, and by complete for page dynamic load, and the event in triggering page is to obtain new URL and the decanting point of JavaSricpt or Ajax generation.Wherein, new URL also stored in URL queue, can wait for that the page explores the access of module.
The step of web analysis module practical function comprises,
1) collection of event, finds in webpage and may resolve JavaScript and load the click event of Ajax and trigger;
2) URL collects, and new URL is put into url list to be visited and is used for exploring the page;
3) decanting point is collected, for Hole Detection afterwards.
(2) Hole Detection module: this module comprises automatic detection module and leak judge module two submodules, two submodules use Ghost.py as browser engine jointly, automatic detection module is to decanting point automatic filling vector of attack, the Cheat Sheet that the vector of attack adopted provides for RSnake, it comprises the multiple vector of attack walking around XSS inspection.After these vector of attacks through design are submitted to, execution result is transferred to leak judge module to judge, if there is leak, the page can perform one and eject the script reminding frame, its content is XSS, whether the wait_for_alert () function check now provided based on Ghost.py engine has is reminded frame to occur, can detect webpage and whether perform script, directly judge that whether current decanting point is leaky.
Before the exploration page, also need to carry out web analysis, by complete for page dynamic load, and the event in triggering page is to obtain new URL and the decanting point of JavaSricpt or Ajax generation.The API that load page is wherein provided by Ghost.py completes,
Native system uses the Beautiful Soup storehouse of Python to complete web analysis.Beautiful Soup is the resolver of the HTML/XML that is write with Python, in order to process mark lack of standardization and to generate parsing tree, and provides simple navigation conventional again, the operation of search and amendment parsing tree.
In sum, in order to carry out Aulomatizeted Detect better, native system achieves the function of following two aspects: 1. can resolve JavaScript and load Ajax to obtain the framework of the network enabled reptile operation of concealed decanting point in the page.2. by submitting to vector of attack to judge the high efficiency method whether XSS leak exists.
This core library comprises re, pywebfuzz, ghost, bs4, pySide, pyQt, and these storehouses are run in the operating system of all main flows, therefore well realizes cross-platform transplanting.
This system adopts python language development completely, has and is easy to safeguard and carry out the feature of secondary development, has very important using value to the detection of XSS leak and research.
Accompanying drawing explanation
Fig. 1 overall system framework (by module).
Fig. 2 URL transaction module designs.
Fig. 3 Hole Detection flow scheme design.
Embodiment
We's ratio juris is the Black-box Testing to server based on Ghost.py, and it is made up of reptile module and Hole Detection module two parts.System architecture as shown in Figure 1.
1.1 reptile modules
Reptile module realizes exploring page function and web analysis function.The reptile exploring the page uses the depth-priority-searching method of recurrence in this paper, only excavates the same area page under one's name.This arthmetic statement is as shown in algorithm 1.
The depth-first recursive algorithm that algorithm 1. page is explored
Input: initial website URL
Export: to input all same domain name page URL that URL crawls for starting point
1. depth capacity MAX_DEPTH is set;
2. current depth depth=0 is set;
If 3. current depth is greater than depth capacity, terminate; Otherwise, perform step 4;
4. access current URL;
5. obtain all URL of the page stored in URL_List;
6., if URL_List is empty, terminate; Otherwise perform step 7;
Using URL next in URL_List as current URL, current depth adds 1, performs step 3;
Before the exploration page, also need to carry out web analysis, by complete for page dynamic load, and the event in triggering page is to obtain new URL and the decanting point of JavaSricpt or Ajax generation.The API that load page is wherein provided by Ghost.py completes,
Web analysis mainly completes three functions, and one is that event is collected, and finds in webpage and may resolve JavaScript and load the click event of Ajax and trigger; Two is that URL collects, and new URL is put into url list to be visited and is used for exploring the page; Three is that decanting point is collected, for Hole Detection afterwards.
Native system uses the Beautiful Soup storehouse of Python to complete web analysis.Beautiful Soup is the resolver of the HTML/XML that is write with Python, and it can well process mark lack of standardization and generate parsing tree, and provides simple navigation conventional again, the operation of search and amendment parsing tree.
(1) trigger event
During trigger event, use Beautiful Soup library searching with the label of event attribute, use Ghost.py analog subscriber clicking trigger event afterwards.Browser resolves JavaScript may be made after event is clicked and load Ajax, producing the change of DOM element or the redirect of URL, take this different modes to tackle.If jump to new URL, store current URL and the page before returning, produce DOM element and then need again to find whether occurred new event, till no longer producing DOM element, step such as algorithm 2 describes:
Algorithm 2. page DOM element deployment algorithm
Input: ask the page HTML code obtained for the first time
Export: the page HTML code after expansion
1. obtain all labels containing event stored in tag_list, remove the label repeated;
2. next label of not accessing in tag_list is clicked in simulation;
3. by this label stored in visit [], be labeled as and accessed;
4., if page jump, perform step 5; Otherwise, perform step 6;
5. by the page URL after redirect stored in URL_List, perform step 2;
If DOM element changes, perform step 1;
In this way, webpage constantly can be launched, to reach the object finding concealed decanting point.
(2) URL is added
URL hyperlink is generally present in the href attribute of <a> label, for the <a> label in HTML, the value of its href attribute can be the relative of any effective document or absolute URL, comprises fragment identifier and JavaScript code section.When general user clicks the content in <a> label, the URL that browser is specified except jumping to href attribute, also may perform the list of JavaScript expression formula, method sum functions.
Traditional web crawlers only adopts the form of the general URL of matching regular expressions, misses the page and decanting point so possibly, so native system is by the Ghost.py storehouse with browser engine, carries out multiple process, as shown in Figure 2 to the value of href.Normalization function carries out string processing for different situations, converts thereof into the form of general URL.If the URL after conversion is not in lists, excavate being stored to url list for the page afterwards.
1.2 Hole Detection modules
(1) Hole Detection
Native system employing Black-box Testing method detects target list and whether there is XSS leak.The basic skills of Hole Detection be use RSnake to provide Cheat Sheet as vector of attack to fill in list and to submit to.This Cheat Sheet comprises the multiple vector of attack can walking around XSS inspection, as shown in Figure 2.
After these vector of attacks through design are submitted to, if there is leak, then the page can perform one and eject the script reminding frame, its content is XSS, whether the wait_for_alert () now provided by Ghost.py is detected to have and reminds frame to occur, namely detect webpage and whether perform script, directly judge that whether current decanting point is leaky.When using the method, if ejected dialog box, and containing the data that have a stain in dialog box, then necessarily there is XSS leak in current form.The implementation of Hole Detection as shown in Figure 3.
(2) list and decanting point thereof is searched
If submit some lists to, need to mark the position of this list in dom tree, CSS attribute selector is used to find it afterwards, first find all lists in html document and be stored in array, be labeled as form [0], form [1], find input [0] in form [0] afterwards, input [1] in form [1], input [2], its name attribute is stored in two-dimensional array, due to the attribute uniquely needed when name attribute is and submits request to, so other attribute need not be preserved.
(3) Auto-writing submission form
The function filling in list using Ghost.py to provide herein fills in XSS vector of attack on list hurdle:
ghost.set_field_value("input[name=%s]"%name,xss)
In addition, Ghost.py can also simulate JavaScript statement and carrys out submission form:
ghost.evaluate("document.querySelectorAll('form')[%d]['submit']();"%form_i),expect_loading=True)
Likely there is restriction input length in list, does not allow the Front End Authentication such as some unallowable instruction digits, cause vector of attack not submit to.These checking events are present in the attribute of list, need simulation JavaScript statement to be removed by these attributes.
document.querySelectorAll('input[type=submit]')[0].removeAttribute('onclick');
document.querySelectorAll('input[type=submit]')[0].removeAttribute('onfocus');
Concrete steps such as the algorithm 3 of his-and-hers watches single operation afterwards describes:
Algorithm 3. automatic filling vector of attack is submitted to
Input: the two-dimensional array storing list and decanting point thereof
Export: Hole Detection result
1. traversal preserves the xss_rsnake array of whole XSS vector of attack;
2. each user in list is inputted out, fill with current attack vector;
3. submission form;
4. judge whether to there is XSS leak according to leak detection method, if existed, perform step 5; Otherwise perform step 1;
5. store the position of leak in DOM, current page URL and out of Memory;
6. terminate;
Some vector of attacks through design of table 1
Claims (1)
1. based on an XSS leak detection method for simulation browser behavior, it is characterized in that: this method is based on the Black-box Testing to server of Ghost.py, and it is made up of reptile module and Hole Detection module two parts;
1.1 reptile modules
Reptile module realizes exploring page function and web analysis function; The reptile exploring the page uses the depth-priority-searching method of recurrence in this paper, only excavates the same area page under one's name; This arthmetic statement is as shown in algorithm 1;
The depth-first recursive algorithm that algorithm 1. page is explored
Input: initial website URL
Export: to input all same domain name page URL that URL crawls for starting point
1. depth capacity MAX_DEPTH is set;
2. current depth depth=0 is set;
If 3. current depth is greater than depth capacity, terminate; Otherwise, perform step 4;
4. access current URL;
5. obtain all URL of the page stored in URL_List;
6., if URL_List is empty, terminate; Otherwise perform step 7;
Using URL next in URL_List as current URL, current depth adds 1, performs step 3;
Before the exploration page, also need to carry out web analysis, by complete for page dynamic load, and the event in triggering page is to obtain new URL and the decanting point of JavaSricpt or Ajax generation; The API that load page is wherein provided by Ghost.py completes,
Web analysis mainly completes three functions, and one is that event is collected, and finds in webpage and may resolve JavaScript and load the click event of Ajax and trigger; Two is that URL collects, and new URL is put into url list to be visited and is used for exploring the page; Three is that decanting point is collected, for Hole Detection afterwards;
This method uses the Beautiful Soup storehouse of Python to complete web analysis; Beautiful Soup is the resolver of the HTML/XML that is write with Python, and it can well process mark lack of standardization and generate parsing tree, and provides simple navigation conventional again, the operation of search and amendment parsing tree;
(1) trigger event
During trigger event, use Beautiful Soup library searching with the label of event attribute, use Ghost.py analog subscriber clicking trigger event afterwards; Browser resolves JavaScript may be made after event is clicked and load Ajax, producing the change of DOM element or the redirect of URL, take this different modes to tackle; If jump to new URL, store current URL and the page before returning, produce DOM element and then need again to find whether occurred new event, till no longer producing DOM element, step such as algorithm 2 describes:
Algorithm 2. page DOM element deployment algorithm
Input: ask the page HTML code obtained for the first time
Export: the page HTML code after expansion
1. obtain all labels containing event stored in tag_list, remove the label repeated;
2. next label of not accessing in tag_list is clicked in simulation;
3. by this label stored in visit [], be labeled as and accessed;
4., if page jump, perform step 5; Otherwise, perform step 6;
5. by the page URL after redirect stored in URL_List, perform step 2;
If DOM element changes, perform step 1;
In this way, webpage constantly can be launched, to reach the object finding concealed decanting point;
(2) URL is added
URL hyperlink is generally present in the href attribute of <a> label, for the <a> label in HTML, the value of its href attribute can be the relative of any effective document or absolute URL, comprises fragment identifier and JavaScript code section; When general user clicks the content in <a> label, the URL that browser is specified except jumping to href attribute, also may perform the list of JavaScript expression formula, method sum functions;
Traditional web crawlers only adopts the form of the general URL of matching regular expressions, misses the page and decanting point so possibly, so native system is by the Ghost.py storehouse with browser engine, carries out multiple process to the value of href; Normalization function carries out string processing for different situations, converts thereof into the form of general URL; If the URL after conversion is not in lists, excavate being stored to url list for the page afterwards;
1.2 Hole Detection modules
(1) Hole Detection
This method employing Black-box Testing method detects target list and whether there is XSS leak; The basic skills of Hole Detection be use RSnake to provide Cheat Sheet as vector of attack to fill in list and to submit to; This Cheat Sheet comprises the multiple vector of attack can walking around XSS inspection;
After these vector of attacks through design are submitted to, if there is leak, then the page can perform one and eject the script reminding frame, its content is XSS, whether the wait_for_alert () now provided by Ghost.py is detected to have and reminds frame to occur, namely detect webpage and whether perform script, directly judge that whether current decanting point is leaky; When using the method, if ejected dialog box, and containing the data that have a stain in dialog box, then necessarily there is XSS leak in current form;
(2) list and decanting point thereof is searched
If submit some lists to, need to mark the position of this list in dom tree, CSS attribute selector is used to find it afterwards, first find all lists in html document and be stored in array, be labeled as form [0], form [1], find input [0] in form [0] afterwards, input [1] in form [1], input [2], its name attribute is stored in two-dimensional array, due to the attribute uniquely needed when name attribute is and submits request to, so other attribute need not be preserved;
(3) Auto-writing submission form
The function filling in list using Ghost.py to provide herein fills in XSS vector of attack on list hurdle:
ghost.set_field_value("input[name=%s]"%name,xss)
In addition, Ghost.py can also simulate JavaScript statement and carrys out submission form:
ghost.evaluate(
"document.querySelectorAll('form')[%d]['submit']();"%form_i),expect_loading=True)
Likely there is restriction input length in list, does not allow the Front End Authentication such as some unallowable instruction digits, cause vector of attack not submit to; These checking events are present in the attribute of list, need simulation JavaScript statement to be removed by these attributes;
document.querySelectorAll('input[type=submit]')[0].removeAttribute('onclick');
document.querySelectorAll('input[type=submit]')[0].removeAttribute('onfocus');
Concrete steps such as the algorithm 3 of his-and-hers watches single operation afterwards describes:
Algorithm 3. automatic filling vector of attack is submitted to
Input: the two-dimensional array storing list and decanting point thereof
Export: Hole Detection result
1. traversal preserves the xss_rsnake array of whole XSS vector of attack;
2. each user in list is inputted out, fill with current attack vector;
3. submission form;
4. judge whether to there is XSS leak according to leak detection method, if existed, perform step 5; Otherwise perform step 1;
5. store the position of leak in DOM, current page URL and out of Memory;
6. terminate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510262308.8A CN104881608B (en) | 2015-05-21 | 2015-05-21 | A kind of XSS leak detection methods based on simulation browser behavior |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510262308.8A CN104881608B (en) | 2015-05-21 | 2015-05-21 | A kind of XSS leak detection methods based on simulation browser behavior |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104881608A true CN104881608A (en) | 2015-09-02 |
CN104881608B CN104881608B (en) | 2018-03-16 |
Family
ID=53949098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510262308.8A Expired - Fee Related CN104881608B (en) | 2015-05-21 | 2015-05-21 | A kind of XSS leak detection methods based on simulation browser behavior |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104881608B (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105243019A (en) * | 2015-10-27 | 2016-01-13 | 北京神州绿盟信息安全科技股份有限公司 | Method and apparatus for detecting python code bugs |
CN105430002A (en) * | 2015-12-18 | 2016-03-23 | 北京奇虎科技有限公司 | Vulnerability detection method and device |
CN106022135A (en) * | 2016-02-23 | 2016-10-12 | 北京工业大学 | Automatic detection system capable of dynamically determining XSS vulnerability |
CN106845248A (en) * | 2017-01-18 | 2017-06-13 | 北京工业大学 | A kind of XSS leak detection methods based on state transition graph |
CN107085686A (en) * | 2017-03-24 | 2017-08-22 | 深圳市九州安域科技有限公司 | A kind of detection method and its system of interactive XSS leaks |
CN107103241A (en) * | 2017-03-15 | 2017-08-29 | 广西科技大学 | A kind of method of testing for automatically generating storage-type XSS attack vector |
CN107103242A (en) * | 2017-05-11 | 2017-08-29 | 北京安赛创想科技有限公司 | The acquisition methods and device of data |
CN107147645A (en) * | 2017-05-11 | 2017-09-08 | 北京安赛创想科技有限公司 | The acquisition methods and device of network security data |
CN107294918A (en) * | 2016-03-31 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of fishing webpage detection method and device |
CN107506649A (en) * | 2017-08-25 | 2017-12-22 | 福建中金在线信息科技有限公司 | A kind of leak detection method of html web page, device and electronic equipment |
CN107844701A (en) * | 2016-09-21 | 2018-03-27 | 南京大学 | A kind of cross-site scripting attack detection method for input of analyzing and make a variation based on program |
CN111767542A (en) * | 2020-02-06 | 2020-10-13 | 北京沃东天骏信息技术有限公司 | Unauthorized detection method and device |
CN111859387A (en) * | 2019-04-25 | 2020-10-30 | 北京九州正安科技有限公司 | Automatic construction method for Android platform software vulnerability model |
CN112738127A (en) * | 2021-01-08 | 2021-04-30 | 西安邮电大学 | Web-based website and host vulnerability detection system and method thereof |
CN113612745A (en) * | 2021-07-23 | 2021-11-05 | 苏州浪潮智能科技有限公司 | Vulnerability detection method, system, equipment and medium |
CN114629688A (en) * | 2022-02-22 | 2022-06-14 | 中国人民解放军国防科技大学 | File uploading vulnerability mining method and system based on dynamic test |
CN115221529A (en) * | 2022-09-14 | 2022-10-21 | 杭州天谷信息科技有限公司 | Method and system for injecting abnormity of front-end webpage |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101964025A (en) * | 2009-07-23 | 2011-02-02 | 中联绿盟信息技术(北京)有限公司 | XSS (Cross Site Scripting) detection method and device |
CN102999420A (en) * | 2011-09-13 | 2013-03-27 | 阿里巴巴集团控股有限公司 | XSS (Cross Site Scripting) testing method and XSS testing system based on DOM (Document Object Model) |
CN103026684A (en) * | 2010-07-22 | 2013-04-03 | 国际商业机器公司 | Cross-site scripting attack protection |
US8949990B1 (en) * | 2007-12-21 | 2015-02-03 | Trend Micro Inc. | Script-based XSS vulnerability detection |
-
2015
- 2015-05-21 CN CN201510262308.8A patent/CN104881608B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8949990B1 (en) * | 2007-12-21 | 2015-02-03 | Trend Micro Inc. | Script-based XSS vulnerability detection |
CN101964025A (en) * | 2009-07-23 | 2011-02-02 | 中联绿盟信息技术(北京)有限公司 | XSS (Cross Site Scripting) detection method and device |
CN103026684A (en) * | 2010-07-22 | 2013-04-03 | 国际商业机器公司 | Cross-site scripting attack protection |
CN102999420A (en) * | 2011-09-13 | 2013-03-27 | 阿里巴巴集团控股有限公司 | XSS (Cross Site Scripting) testing method and XSS testing system based on DOM (Document Object Model) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105243019A (en) * | 2015-10-27 | 2016-01-13 | 北京神州绿盟信息安全科技股份有限公司 | Method and apparatus for detecting python code bugs |
CN105430002A (en) * | 2015-12-18 | 2016-03-23 | 北京奇虎科技有限公司 | Vulnerability detection method and device |
CN106022135A (en) * | 2016-02-23 | 2016-10-12 | 北京工业大学 | Automatic detection system capable of dynamically determining XSS vulnerability |
CN107294918A (en) * | 2016-03-31 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of fishing webpage detection method and device |
CN107844701A (en) * | 2016-09-21 | 2018-03-27 | 南京大学 | A kind of cross-site scripting attack detection method for input of analyzing and make a variation based on program |
CN106845248A (en) * | 2017-01-18 | 2017-06-13 | 北京工业大学 | A kind of XSS leak detection methods based on state transition graph |
CN107103241A (en) * | 2017-03-15 | 2017-08-29 | 广西科技大学 | A kind of method of testing for automatically generating storage-type XSS attack vector |
CN107085686A (en) * | 2017-03-24 | 2017-08-22 | 深圳市九州安域科技有限公司 | A kind of detection method and its system of interactive XSS leaks |
CN107147645A (en) * | 2017-05-11 | 2017-09-08 | 北京安赛创想科技有限公司 | The acquisition methods and device of network security data |
CN107103242A (en) * | 2017-05-11 | 2017-08-29 | 北京安赛创想科技有限公司 | The acquisition methods and device of data |
CN107147645B (en) * | 2017-05-11 | 2020-05-05 | 北京安赛创想科技有限公司 | Method and device for acquiring network security data |
CN107506649A (en) * | 2017-08-25 | 2017-12-22 | 福建中金在线信息科技有限公司 | A kind of leak detection method of html web page, device and electronic equipment |
CN111859387A (en) * | 2019-04-25 | 2020-10-30 | 北京九州正安科技有限公司 | Automatic construction method for Android platform software vulnerability model |
CN111767542A (en) * | 2020-02-06 | 2020-10-13 | 北京沃东天骏信息技术有限公司 | Unauthorized detection method and device |
CN112738127A (en) * | 2021-01-08 | 2021-04-30 | 西安邮电大学 | Web-based website and host vulnerability detection system and method thereof |
CN112738127B (en) * | 2021-01-08 | 2023-04-07 | 西安邮电大学 | Web-based website and host vulnerability detection system and method thereof |
CN113612745A (en) * | 2021-07-23 | 2021-11-05 | 苏州浪潮智能科技有限公司 | Vulnerability detection method, system, equipment and medium |
CN114629688A (en) * | 2022-02-22 | 2022-06-14 | 中国人民解放军国防科技大学 | File uploading vulnerability mining method and system based on dynamic test |
CN114629688B (en) * | 2022-02-22 | 2024-03-15 | 中国人民解放军国防科技大学 | File uploading vulnerability mining method and system based on dynamic test |
CN115221529A (en) * | 2022-09-14 | 2022-10-21 | 杭州天谷信息科技有限公司 | Method and system for injecting abnormity of front-end webpage |
CN115221529B (en) * | 2022-09-14 | 2022-12-27 | 杭州天谷信息科技有限公司 | Method and system for injecting abnormity of front-end webpage |
Also Published As
Publication number | Publication date |
---|---|
CN104881608B (en) | 2018-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104881608A (en) | XSS vulnerability detection method based on simulating browser behavior | |
CN104881607A (en) | XSS vulnerability detection method based on simulating browser behavior | |
US8065667B2 (en) | Injecting content into third party documents for document processing | |
CN106022135A (en) | Automatic detection system capable of dynamically determining XSS vulnerability | |
Gupta et al. | PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications | |
CN103559235B (en) | A kind of online social networks malicious web pages detection recognition methods | |
CN101964025B (en) | XSS detection method and equipment | |
CN102436563B (en) | Method and device for detecting page tampering | |
US20110173178A1 (en) | Method and system for obtaining script related information for website crawling | |
CN107832622B (en) | Leak detection method, device, computer equipment and storage medium | |
CN105678170A (en) | Method for dynamically detecting cross site scripting (XSS) bugs | |
CN102156832B (en) | Security defect detection method for Firefox expansion | |
CN104572777B (en) | Webpage loading method and device based on UIWebView component | |
CN101751530B (en) | Method for detecting loophole aggressive behavior and device | |
CN106022132A (en) | Real-time webpage Trojan detection method based on dynamic content analysis | |
US20230106266A1 (en) | Indexing Access Limited Native Applications | |
CN102591965A (en) | Method and device for detecting black chain | |
WO2022063133A1 (en) | Sensitive information detection method and apparatus, and device and computer-readable storage medium | |
Mitropoulos et al. | Time present and time past: analyzing the evolution of JavaScript code in the wild | |
CN108694325A (en) | The condition discriminating apparatus of the discriminating conduct and specified type website of specified type website | |
Brisset et al. | Erratum: Leveraging flexible tree matching to repair broken locators in web automation scripts | |
Liu et al. | A XSS vulnerability detection approach based on simulating browser behavior | |
CN110719344B (en) | Domain name acquisition method and device, electronic equipment and storage medium | |
CN103390129A (en) | Method and device for detecting security of uniform resource locator | |
CN108200191B (en) | Utilize the client dynamic URL associated script character string detection system of perturbation method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180316 Termination date: 20210521 |