CN106789877A - A kind of validating vulnerability system based on sandbox - Google Patents

A kind of validating vulnerability system based on sandbox Download PDF

Info

Publication number
CN106789877A
CN106789877A CN201611005006.3A CN201611005006A CN106789877A CN 106789877 A CN106789877 A CN 106789877A CN 201611005006 A CN201611005006 A CN 201611005006A CN 106789877 A CN106789877 A CN 106789877A
Authority
CN
China
Prior art keywords
sandbox
validating vulnerability
module
attack
validating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611005006.3A
Other languages
Chinese (zh)
Inventor
范渊
陈刚
黄进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN201611005006.3A priority Critical patent/CN106789877A/en
Publication of CN106789877A publication Critical patent/CN106789877A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to website vulnerability detection, it is desirable to provide a kind of validating vulnerability system based on sandbox.The validating vulnerability system that this kind is based on sandbox includes network communication module, validating vulnerability module, response memory module, browser kernel module, reappears for the leak to website.The present invention can preserve environment during validating vulnerability, and provide the page access that custom browser accesses success attack return, more friendly to website writer modification leak, it also avoid to the secondary attack of server and the attack to verifying client computer.

Description

A kind of validating vulnerability system based on sandbox
Technical field
The present invention is more particularly to a kind of validating vulnerability system based on sandbox on website vulnerability detection field.
Background technology
The safety of website is a field being nowadays increasingly taken seriously after Internet high speed developments.Of today The Request and corresponding leak of construction have only been recorded in website vulnerability scanning.This makes up to the website creator later stage BUG is very unfriendly, also, to it is specific attack URL and to do once access checking visitor can be caused to be subjected to page extension horse attack Hit, and server is subjected to secondary attack.
The content of the invention
It is a primary object of the present invention to overcome deficiency of the prior art, there is provided one kind is used for recording test environment, energy Asked HTTPResponse is opened with particular browser, and cuts off the request actively given out a contract for a project in the page, to reach to checking The system of the client protection of leak.In order to solve the above technical problems, solution of the invention is:
A kind of validating vulnerability system based on sandbox is provided, is reappeared for the leak to website, it is described based on sandbox Validating vulnerability system include network communication module, validating vulnerability module, response memory module, browser kernel module;
The network communication module can process http request, and (using http protocol) sends HTTPRequest, gets The HTTPResponse of webpage;
The validating vulnerability module can give the Website server for needing detection, send for detecting leak HTTPRequest, and according to the HTTPResponse contents that server is returned come the leakage corresponding to judging the HTTPRequest Hole whether there is;
The response memory module can will detect leak successful HTTPRequest and HTTPResponse, and original HTTPResponse and HTTPRequset are stored in database, to reach attack context preservation, for late detection personnel's Real-time playback, facilitates patching bugs;
The browser kernel module is used to that the successful content of pages of vulnerability detection to be presented, and can need what is sent to the page Network request is cut off, and prevents the attack of net horse etc in the page.
In the present invention, the network communication module can send packet using http protocol, or call browser to draw The interface held up realize capture network packet function.
In the present invention, the browser engine can be using in webkit, blink, Trident, Gecko or IE kernel Any one realization.
In the present invention, it is described response memory module in database using mangoDB, mysql, sqlite, Any one realization in sqlserver or hbase databases.
The application method of the validating vulnerability system based on sandbox is provided, one is processed using the validating vulnerability system based on sandbox The individual page, concretely comprises the following steps:
1) it is input into an initial URL address;
2) various attack HTTP Requset requests are constructed according to the URL, and sends the request;
3) to step 2) in the packet that sends carry out corresponding HTTP Response and verify, matching success attack Characteristic value;
4) database is stored in the response and request that match success attack;
5) page of success attack is opened with custom browser.
Compared with prior art, the beneficial effects of the invention are as follows:
The present invention can preserve environment during validating vulnerability, and provide the page that custom browser accesses success attack return Interview is asked, more friendly to website writer modification leak, be it also avoid to the secondary attack of server and to checking visitor The attack of family machine.
Brief description of the drawings
Fig. 1 is operating diagram of the invention.
Specific embodiment
Firstly the need of explanation, the validating vulnerability the present invention relates to be based on sandbox is computer technology in internet skill A kind of application in art field.In implementation process of the invention, the application of multiple software function modules can be related to.Applicant recognizes For such as after application documents, accurate understanding realization principle of the invention and goal of the invention is read over, with reference to existing known In the case of technology, those skilled in the art can use the software programming technical ability of its grasp to realize the present invention completely.It is foregoing soft Part functional module includes but is not limited to:Network communication module, validating vulnerability module etc., the category that all the present patent application files are referred to This category, applicant will not enumerate.
The present invention is described in further detail with specific embodiment below in conjunction with the accompanying drawings:
A kind of validating vulnerability system based on sandbox as shown in Figure 1, including network communication module, validating vulnerability module, Response memory module, browser kernel module.
The network communication module can process http request, and send HTTPRequest using http protocol, and get The HTTPResponse of webpage;
Browser engine is used to receive a local content as input, loads the pin in the page and the Dynamic Execution page This, browser engine can detect webpage and send network packet, and cut off the connection of the packet.Browser engine can be Webkit, blink, Trident, Gecko etc., or the browser engine oneself realized.
Http request, ftp communications etc. can be processed oneself to realize network communication module in a program, thus can be The all-network packet of checking leak is captured in this code.If oneself does not realize network communication module, it is also possible to by Original network communication module inserts code, has reached the effect of energy packet capturing.
The validating vulnerability module sends the HTTPRequest for detecting leak can to the Website server for needing detection, and The HTTPResponse contents returned according to server whether there is come the leak corresponding to judging the request of the Hole Detection.
The response memory module can will detect leak successful HTTPRequest and HTTPResponse and original HTTPResponse and HTTPRequset are stored in database, to reach attack context preservation, for late detection personnel's Real-time playback, facilitates patching bugs.
Database therein is using any in mangoDB, mysql, sqlite, sqlserver or hbase database One kind is realized.
The browser kernel module is used to present to the successful content of pages of vulnerability detection, and the page can be needed to send Network request cut off, prevent the attack of net horse etc in the page.
A page is processed using the validating vulnerability system for being based on sandbox, its idiographic flow is:
1st, an initial URL address is input into program.
2nd, program constructs various attack HTTP Requset requests according to the URL, and sends the request.
3rd, corresponding HTTP Response are carried out to the packet sent in 2 to verify, matches the feature of success attack Value.
4th, database is stored in the response and request that match success attack.
5th, the page of success attack is opened with custom browser.
Finally it should be noted that listed above is only specific embodiment of the invention.It is clear that the invention is not restricted to Above example, can also there is many variations.One of ordinary skill in the art can directly lead from present disclosure The all deformations for going out or associating, are considered as protection scope of the present invention.

Claims (5)

1. a kind of validating vulnerability system based on sandbox, reappears, it is characterised in that described to be based on for the leak to website The validating vulnerability system of sandbox includes network communication module, validating vulnerability module, response memory module, browser kernel module;
The network communication module can process http request, and send HTTPRequest, get webpage HTTPResponse;
The validating vulnerability module can give the Website server for needing detection, send the HTTPRequest for detecting leak, and The HTTPResponse contents returned according to server whether there is come the leak corresponding to judging the HTTPRequest;
The response memory module can will detect leak successful HTTPRequest and HTTPResponse, and original HTTPResponse and HTTPRequset are stored in database, to reach attack context preservation, for late detection personnel's Real-time playback, facilitates patching bugs;
The browser kernel module is used to that the successful content of pages of vulnerability detection, and the network that can be sent page needs to be presented Request is cut off, and prevents the attack of net horse etc in the page.
2. a kind of validating vulnerability system based on sandbox according to claim 1, it is characterised in that the network service mould Block can send packet using http protocol, or call the interface of browser engine to realize capturing the work(of network packet Energy.
3. a kind of validating vulnerability system based on sandbox according to claim 2, it is characterised in that the browser engine Can be using any one realization in webkit, blink, Trident, Gecko or IE kernel.
4. a kind of validating vulnerability system based on sandbox according to claim 1, it is characterised in that the response stores mould Database in block is using any one reality in mangoDB, mysql, sqlite, sqlserver or hbase database It is existing.
5. the application method of the validating vulnerability system of sandbox is based on described in claim 1, it is characterised in that used based on sandbox Validating vulnerability system processes a page, concretely comprises the following steps:
1) it is input into an initial URL address;
2) various attack HTTP Requset requests are constructed according to the URL, and sends the request;
3) to step 2) in the packet that sends carry out corresponding HTTP Response and verify, match the feature of success attack Value;
4) database is stored in the response and request that match success attack;
5) page of success attack is opened with custom browser.
CN201611005006.3A 2016-11-15 2016-11-15 A kind of validating vulnerability system based on sandbox Pending CN106789877A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611005006.3A CN106789877A (en) 2016-11-15 2016-11-15 A kind of validating vulnerability system based on sandbox

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611005006.3A CN106789877A (en) 2016-11-15 2016-11-15 A kind of validating vulnerability system based on sandbox

Publications (1)

Publication Number Publication Date
CN106789877A true CN106789877A (en) 2017-05-31

Family

ID=58968135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611005006.3A Pending CN106789877A (en) 2016-11-15 2016-11-15 A kind of validating vulnerability system based on sandbox

Country Status (1)

Country Link
CN (1) CN106789877A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107908959A (en) * 2017-11-10 2018-04-13 北京知道创宇信息技术有限公司 Site information detection method, device, electronic equipment and storage medium
CN108154035A (en) * 2017-12-21 2018-06-12 杭州安恒信息技术有限公司 Extensive website vulnerability scan method, device and electronic equipment
CN110348210A (en) * 2018-04-08 2019-10-18 腾讯科技(深圳)有限公司 Safety protecting method and device
CN113704669A (en) * 2021-09-01 2021-11-26 稿定(厦门)科技有限公司 Data processing method and device for webpage operation
CN113949579A (en) * 2021-10-20 2022-01-18 安天科技集团股份有限公司 Website attack defense method and device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880830A (en) * 2011-07-15 2013-01-16 华为软件技术有限公司 Acquisition method and device of original test data
CN104200166A (en) * 2014-08-05 2014-12-10 杭州安恒信息技术有限公司 Script-based website vulnerability scanning method and system
CN105447385A (en) * 2014-12-08 2016-03-30 哈尔滨安天科技股份有限公司 Multilayer detection based application type database honey pot realization system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880830A (en) * 2011-07-15 2013-01-16 华为软件技术有限公司 Acquisition method and device of original test data
CN104200166A (en) * 2014-08-05 2014-12-10 杭州安恒信息技术有限公司 Script-based website vulnerability scanning method and system
CN105447385A (en) * 2014-12-08 2016-03-30 哈尔滨安天科技股份有限公司 Multilayer detection based application type database honey pot realization system and method

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107908959A (en) * 2017-11-10 2018-04-13 北京知道创宇信息技术有限公司 Site information detection method, device, electronic equipment and storage medium
CN107908959B (en) * 2017-11-10 2020-02-14 北京知道创宇信息技术股份有限公司 Website information detection method and device, electronic equipment and storage medium
CN108154035A (en) * 2017-12-21 2018-06-12 杭州安恒信息技术有限公司 Extensive website vulnerability scan method, device and electronic equipment
CN108154035B (en) * 2017-12-21 2021-01-26 杭州安恒信息技术股份有限公司 Large-scale website vulnerability scanning method and device and electronic equipment
CN110348210A (en) * 2018-04-08 2019-10-18 腾讯科技(深圳)有限公司 Safety protecting method and device
CN113704669A (en) * 2021-09-01 2021-11-26 稿定(厦门)科技有限公司 Data processing method and device for webpage operation
CN113704669B (en) * 2021-09-01 2022-10-14 稿定(厦门)科技有限公司 Data processing method and device for webpage operation
CN113949579A (en) * 2021-10-20 2022-01-18 安天科技集团股份有限公司 Website attack defense method and device, computer equipment and storage medium
CN113949579B (en) * 2021-10-20 2024-04-30 安天科技集团股份有限公司 Website attack defense method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106789877A (en) A kind of validating vulnerability system based on sandbox
US10567407B2 (en) Method and system for detecting malicious web addresses
US8819819B1 (en) Method and system for automatically obtaining webpage content in the presence of javascript
CN104954372B (en) A kind of evidence obtaining of fishing website and verification method and system
CN102571846B (en) Method and device for forwarding hyper text transport protocol (HTTP) request
US10834105B2 (en) Method and apparatus for identifying malicious website, and computer storage medium
CN109768992B (en) Webpage malicious scanning processing method and device, terminal device and readable storage medium
CN111813701B (en) HTTP-based interface testing method and device, computer equipment and storage medium
CN103561036A (en) Request intercepting method and device in white-list internet surfing environment
CN102664872B (en) For detection of with the method preventing server attack in computer network
CN106446113A (en) Mobile big data analysis method and device
CN107347076A (en) The detection method and device of SSRF leaks
CN108667770A (en) A kind of loophole test method, server and the system of website
US10701087B2 (en) Analysis apparatus, analysis method, and analysis program
CN105635064A (en) CSRF attack detection method and device
CN113190839A (en) Web attack protection method and system based on SQL injection
CN105100065B (en) Webshell attack detection methods, device and gateway based on cloud
WO2018018699A1 (en) Website scripting attack prevention method and device
CN108322420A (en) The detection method and device of backdoor file
CN104660556A (en) Cross site request forgery vulnerability detection method and device
CN113141332B (en) Command injection identification method, system, equipment and computer storage medium
CN106612283B (en) Method and device for identifying source of downloaded file
Ham et al. Big Data Preprocessing Mechanism for Analytics of Mobile Web Log.
CN113032836B (en) Data desensitization method and apparatus
CN111859387A (en) Automatic construction method for Android platform software vulnerability model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531