CN108667770A - A kind of loophole test method, server and the system of website - Google Patents
A kind of loophole test method, server and the system of website Download PDFInfo
- Publication number
- CN108667770A CN108667770A CN201710197801.5A CN201710197801A CN108667770A CN 108667770 A CN108667770 A CN 108667770A CN 201710197801 A CN201710197801 A CN 201710197801A CN 108667770 A CN108667770 A CN 108667770A
- Authority
- CN
- China
- Prior art keywords
- url link
- test
- website
- measured
- access request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
The embodiment of the invention discloses loophole test method, server and the system of a kind of website, this method includes:It obtains client and is sent to the access request of Website server, and Website server will be given in acquired access request;The access request includes:The corresponding at least one uniform resource position mark URL link of Website server;The acquired each access request of record;If detecting website vulnerability test instruction, the access request of record is transferred, at least one URL link to be measured is determined from the corresponding URL link of access request transferred;The test URL link for being revised as each URL link to be measured to have loophole test statement obtains the corresponding test URL link of each URL link to be measured;According to each test URL link, the website vulnerability test result of each URL link to be measured is determined.Based on method disclosed by the invention, realize that website burden is lighter, and the comprehensive higher website vulnerability test of test result.
Description
Technical field
The present invention relates to website security technical fields, and in particular to a kind of loophole test method of website, server and is
System.
Background technology
With the development of web technology, web portal security problem becomes increasingly conspicuous, and the loophole of especially website is easy to be attacked
Person utilizes, and to influence the safety of website, therefore tests website vulnerability, finds that the loophole present in website seems in time and particularly must
It wants.
The test mode of current web loophole mainly uses active scan mode, such as captures net by web crawlers
The URL to stand carries out loophole test according to the URL captured to website;This URL that website is captured by web crawlers comes real
Showing the problems of the mode of website vulnerability test is:Web crawlers crawls website, can be caused to website prodigious
Flow pressure;Therefore how a kind of website vulnerability test method that website burden is lighter is provided, those skilled in the art are become
Problem needed to be considered.
Invention content
In view of this, the embodiment of the present invention provides a kind of loophole test method, server and the system of website, to realize net
The lighter website vulnerability test of burden of standing.
To achieve the above object, the embodiment of the present invention provides the following technical solutions:
A kind of loophole test method of website, including:
It obtains client and is sent to the access request of Website server, and the net will be given in acquired access request
Site server;The access request includes:The corresponding at least one uniform resource position mark URL link of the Website server;
The acquired each access request of record;
If detecting website vulnerability test instruction, the access request of record is transferred, it is corresponding from the access request transferred
At least one URL link to be measured is determined in URL link;
The test URL link for being revised as each URL link to be measured to have loophole test statement obtains each URL link to be measured
Corresponding test URL link;
According to each test URL link, the website vulnerability test result of each URL link to be measured is determined.
The embodiment of the present invention also provides a kind of server, including:
Access agent module, is sent to the access request of Website server for obtaining client, and by acquired visit
It asks in request and is given to the Website server;The access request includes:The corresponding unified resource positioning of the Website server
Accord with URL link;
Logging modle, for recording acquired each access request;
If link determining module to be measured transfers the access request of record, from institute for detecting website vulnerability test instruction
At least one URL link to be measured is determined in the corresponding URL link of access request transferred;
Test link determining module, the test URL chains for being revised as each URL link to be measured that there is loophole test statement
It connects, obtains the corresponding test URL link of each URL link to be measured;
Loophole test result determining module, for according to each test URL link, determining that each test URL link is corresponding and waiting for
Survey the website vulnerability test result of URL link.
The embodiment of the present invention also provides a kind of loophole test system of website, including:
Proxy server, is sent to the access request of Website server for obtaining client, and by acquired access
The Website server is given in request;The access request includes:The corresponding uniform resource locator of the Website server
URL link;
Database, for recording each access request acquired in the proxy server;
If loophole test server transfers record from the database for detecting website vulnerability test instruction
Access request determines at least one URL link to be measured from the corresponding URL link of access request transferred;By each URL to be measured
Link is revised as the test URL link with loophole test statement, obtains the corresponding test URL link of each URL link to be measured;Root
According to each test URL link, the website vulnerability test result of the corresponding URL link to be measured of each test URL link is determined.
Based on the above-mentioned technical proposal, the access request that the embodiment of the present invention can be sent client by access agent form
In be given to Website server, to be recorded to the access request obtained during access agent, to need to carry out website
When loophole is tested, the URL link to be measured of loophole to be measured can be determined from the URL link that the access request of record is included, and will
Each URL link to be measured is revised as the test URL link with loophole test statement, and then is tested according to each test URL link
Website vulnerability is utilized situation, with the test result of each test URL link, to determine each URL link to be measured accordingly
Website vulnerability test result, realize website loophole test.
Since the embodiment of the present invention is to be sent to the visit of Website server by the client obtained during access agent
It asks request, realizes the loophole test of website, therefore can be in client in the normal access process of website, getting test website
URL link used in loophole, website only need to cope with normal access, and the flow burden of website is lighter.As it can be seen that the present invention is real
The loophole test method of the website of example offer is applied, it can be achieved that lighter website vulnerability test is born in website.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the system architecture schematic diagram of the loophole test method provided in an embodiment of the present invention for realizing website;
Fig. 2 is the signaling process figure of the loophole test method of website provided in an embodiment of the present invention;
Fig. 3 is another signaling process figure of the loophole test method of website provided in an embodiment of the present invention;
Fig. 4 is another signaling process figure of the loophole test method of website provided in an embodiment of the present invention;
Fig. 5 is scene method flow diagram provided in an embodiment of the present invention;
Fig. 6 is that the loophole of website provided in an embodiment of the present invention tests the hardware component schematic diagram of system;
Fig. 7 is the method flow diagram of the loophole test method of website provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of server provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is the system architecture schematic diagram of the loophole test method provided in an embodiment of the present invention for realizing website, with reference to figure
1, which may include:Client 10, proxy server 20, database 30 and loophole test server 40;
Wherein, client 10 can be loaded on the mobile terminals such as smart mobile phone, tablet computer and laptop, at this
In inventive embodiments, client 10 has Webpage function of browse;If client 10 can be web browser, for another example client
It can be embedded in the component etc. with page browsing function in end 10;
Proxy server 20, loophole test server 40 can be disposed on the service equipment of network side;
Wherein, proxy server 20 is the computer system for providing external network proxy services or the other kinds of network terminal,
Network agent refers specifically to allow a network terminal, generally client, by this service and another network terminal, generally
For server, indirect connection is carried out, the network equipments such as some gateways and router have network agent function;
Database 30 is to come tissue, storage and the warehouse for managing data according to data structure, builds on computer storage and sets
It is standby upper;
Loophole test server 40 is to export the service equipment of the required website vulnerability test result of the embodiment of the present invention,
Loophole test server 40 can be realized by single server, can also be realized by the server farm that multiple servers form.
Based on above system framework, below to a kind of signaling of the loophole test method of website provided in an embodiment of the present invention
Flow is introduced, and a kind of optional signaling process figure can be as shown in Figure 2.
Before the step S101 in executing signaling process figure shown in Fig. 2, it is necessary first to which institute is arranged in Configuration network environment
There is the flow from client to Website server all to pass through proxy server;Then it is generation of the proxy server setting for communication
Manage agreement, wherein agency agreement can be http agreements or https agreements, specific protocol type can according to actual needs into
Row selection;It is finally that browser or gateway proxy is arranged in proxy server.
Further, to ensure the agent security of proxy server, after to proxy server setting agency agreement success,
Can also to client provide an agent address for needing basic certifications, specific authentication mode may be used password authentication and/
Or IP white lists;
It should be noted that a kind of common authentication mode of basic certifications, is usually used in the verification of stateless client, than
Such as the certification of HTTP Invoker (HTTP call device) or Web Service (Web platforms), the characteristics of this scene is client
End is accessed every time in application, all in request header carrying authentication information, is generally exactly username and password, because of basic certifications
It can transmit in plain text, so https transmission datas are preferred.
Fig. 2 is returned to, signaling process shown in Fig. 2 may include steps of:
S101, proxy server obtain client and are sent to the access request of Website server, and by acquired access
The Website server is given in request;The access request includes:The corresponding at least one unified resource of Website server is fixed
Position symbol URL link;
During executing step S101, access request can be before website is reached the standard grade, and client is to Website server
Test access request when what is sent is used for unit testing, regression test and functional test can also be client to website
What server was sent is used to watch video, plays the daily access requests such as game.
Each access request is recorded in database for S102, proxy server;
S103 transfers the access of record if loophole test server detects website vulnerability test instruction from database
Request;
During executing step S103, the generating mode of website vulnerability test instruction can be artificial output, also may be used
When being that present system time reaches test period, system automatically generated;
Optionally, when loophole test server maiden visit database, called data library whole access request, and from institute
At least one URL link to be measured is determined in the whole corresponding URL links of access request transferred;
Optionally, the access request for the carry out website vulnerability test transferred can be also marked, tests and takes when loophole
When business device accesses database again, not labeled access request can be transferred from database, this has further ensured that loophole
Test comprehensive and that removes processed access request from transfer processing again, promotion treatment effeciency.
S104, loophole test server carry out duplicate removal processing to the corresponding URL link of the access request transferred;
It, can be according to similarity calculating method for each URL link transferred during executing step S104
The degree of correlation with other URL links is calculated separately, and retains other each URL links that the degree of correlation is less than threshold value, for example, for
URL link " 201702171234.htmlId=2 ", with URL link " 201702171234.htmlId=1 " is due to the degree of correlation
It is very high, therefore test one of URL link;
It should be noted that similarity calculation is used to weigh the similarity degree between object, in data mining and nature
It is a basic calculating in Language Processing, main includes the Similarity measures between character representation and characteristic set, and is directed to
Different application scenarios are limited to the limitation of data scale and space-time expense etc., can be from cosine similarity computational methods, Pearson
It is specifically chosen in coefficient calculation method and adjustment cosine similarity computational methods.
S105, loophole test server, which is transferred, has tested URL link table, and the URL link charting of having tested has
The URL link of website vulnerability test is carried out;
S106, loophole test server from the URL link after duplicate removal processing, are removed according to URL link table has been tested
The URL link for having carried out website vulnerability test obtains candidate URL link;
S107, loophole test server analyzes the URL link with controllable parameter in candidate URL link, and will have can
The URL link for controlling parameter sorts out polymerization;
The URL link with controllable parameter for sorting out polymerization is determined as at least one wait for by S108, loophole test server
Survey URL link;
S109, for a URL link to be measured, the parameter of the URL link to be measured is split, is obtained by loophole test server
To each fractionation parameter;
S110, loophole test server determine the controllable at least one target component of parameter value from each fractionation parameter, will
The parameter value of each target component replaces with the payload using website vulnerability;
During executing step S110, it can determine that the controllable target component of parameter value is generally through inventor's analysis
Id and user, for example, a http GET request:“http://www.xxx.comGinseng controllable id=1&user=test "
Number refers to that " id " and " user ", parameter value are the subsequent value of parameter equal sign, wherein the corresponding parameter value of parameter " id " is " 1 "
Corresponding parameter value is " test " with parameter " user ";After it is target component to determine parameter " id ", by the parameter of target component
Value replaces with the payload using website vulnerability, for example, the corresponding parameter value " 1 " of target component " id " is replaced with " 2 ".
S111, loophole test server replace with the target component of payload according to parameter value, generate the URL chains to be measured
Connect corresponding test URL link;
During generating test URL link in executing step S111, if the parameters after splitting are determined
For target component, and corresponding parameter value is replaced, then is spliced replaced payload one by one;If split
It is partly targeted parameter in parameters afterwards, also, the parameter value of target component is replaced, then has replaced
Parameter after effect load and the remaining fractionation not being replaced is spliced one by one.
S112, the corresponding test request of each test URL link is sent to Website server by loophole test server, to obtain
Get the corresponding feedback result of each test request;
During executing step S112, test URL link can be sent to network server by loophole test server,
To obtain the corresponding feedback result of each test URL link of network server feedback.
S113, for a URL link to be measured, loophole test server is according to the corresponding test request for testing URL link
The feedback result of feedback result and the URL link to be measured determines the website vulnerability test result of the URL link to be measured;
During executing step S113, for a URL link to be measured, loophole test server compares the URL to be measured
The feedback result of the test request of the feedback result of link and corresponding test URL link, you can comparing result determines that this is to be measured
The website vulnerability test result of URL link;Specifically, if two feedback results are consistent, illustrate the URL link to be measured without leakage
Hole;If two feedback results are inconsistent, illustrate that the URL link to be measured is leaky.
Above step S105~step S106 is only that " loophole test server is according to duplicate removal disclosed in the embodiment of the present application
A kind of preferred realization method of URL link afterwards, determining candidate's URL link " process, the specific implementation in relation to this process
Inventor can be arbitrarily arranged according to the demand of oneself, not limit herein.Also, work as loophole test server maiden visit data
When library, the URL link after duplicate removal is directly determined as candidate URL link;When loophole test server is not maiden visit data
When library, transferring the record being generated in advance has the URL link table of test for the URL link for having carried out website vulnerability test, and root
According to URL link table has been tested from the URL link after duplicate removal processing, removal has carried out the URL link of website vulnerability test, obtains
To the candidate URL link.
Above step S107~step S108 is only that " loophole test server is to candidate disclosed in the embodiment of the present application
URL link carries out classification polymerization, and at least one URL link to be measured is determined from classification polymerization result " one kind of process is excellent
The realization method of choosing, the specific implementation inventor in relation to this process can arbitrarily be arranged according to the demand of oneself, not do herein
It limits.Also, loophole test server classify polymerization process in, first to candidate URL link according to whether there are parameter into
Row classification further judges whether parameter therein is controllable parameter, for example, ginseng to each candidate URL link there are parameter
Number " id " and " user ", so that it is determined that at least one, there are the URL links to be measured of controllable parameter.
Above step S104~step S108 is only that " loophole test server is from being transferred disclosed in the embodiment of the present application
The corresponding URL link of access request in determine at least one URL link to be measured " a kind of preferred realization method of process, have
The specific implementation inventor for closing this process can be arbitrarily arranged according to the demand of oneself, not limit herein.
Above step S109~step S111 is only that " loophole test server will be each to be measured disclosed in the embodiment of the present application
URL link is revised as the test URL link with loophole test statement " a kind of preferred realization method of process, this related mistake
The specific implementation of journey can also be directly to carry out parameter value replacement to the controllable parameter area of URL link to be measured, and inventor can root
Arbitrarily it is arranged according to the demand of oneself, does not limit herein.
Above step S112~step S113 is only " according to each test URL link, to be determined disclosed in the embodiment of the present application
A kind of preferred realization method of each website vulnerability test result for testing the corresponding URL link to be measured of URL link " process, has
The specific implementation for closing this process can also be directly to carry out parameter value replacement, invention to the controllable parameter area of URL link to be measured
People can be arbitrarily arranged according to the demand of oneself, not limit herein.
It should be noted that since proxy server records acquired each access request into database, number
PostgreSQL database mysql can be used according to library, specifically, PostgreSQL database mysql can store access request in the form of log recording,
And log recording includes the packet header uniform resource position mark URL link http, for example, parameter or cookie;
PostgreSQL database mysql is a kind of associated data library management system, and linked database saves the data in different
In table, rather than all data are placed in one big warehouse, which adds speed and improve flexibility;And it increases income
Sql like language used in database mysql is the most frequently used standardized language for accessing database.PostgreSQL database mysql
Software uses double authorization policies, is divided into Community Edition and commercial version, since its is small, speed is fast, the total cost of ownership is low, especially
It is this feature of open source code, and the exploitation of general middle-size and small-size website all selects PostgreSQL database mysql as site databases.
In embodiments of the present invention, loophole test server carries out loophole test, the present invention to the URL link to be measured of crawl
Inventor find, can be to website during loophole test server captures URL link to be measured in the method for web crawlers
Prodigious flow pressure is caused, and can not crawl into website and hide deeper link, leads to website vulnerability test result
It is comprehensive relatively low, it is found by inventor's analysis, concrete reason may be:
Web crawlers technology starts from uniform resource address (URLs) list for being referred to as seed, and web crawlers accesses system
Some uniform resource position mark URL link in one resource address list starts, and reads the URL link and corresponds to the interior of webpage
Hold, and a list to be visited is written into other URL links for including on the webpage found, i.e., it is so-called " territory of creeping "
(crawl frontier), in turn, according to URL link whole in the preset strategy cyclic access list.
Web crawlers, which needs to replicate during accessing each URL link, files and saves as that corresponding " webpage is fast
According to ", it includes html, picture, doc, pdf, multimedia, dynamic web page and other formats to preserve format, due to each URL link pair
The web page contents answered are continually changing, therefore web crawlers is also required to constantly update all " snapshots of web pages " of crawl, still
Crawl mass data can pose a big pressure to website in short time;
Simultaneously as web crawlers does not have powerful operating interactive ability and a business understandability, therefore can only be
The crawl of page structure relatively simple website, for having complicated authentication, with baffle strategy, with complex operations logic
Or the website with the isolated island page, web crawlers need human assistance to be collected URL link, i.e. web crawlers generally can not
It crawls into website and hides deeper link, lead to the comprehensive relatively low of website vulnerability testing result.
Based on this, the embodiment of the present invention is sent to the visit of Website server by the client obtained during access agent
It asks request, realizes the loophole test of website, therefore can be in client in the normal access process of website, getting test website
URL link used in loophole, website only need to cope with normal access, and the flow burden of website is lighter.
Further, the Website page link that the URL link involved by the access request to website is covered more fully, is sent out
The probability for now hiding deeper URL link is higher, may make that URL link used in test website vulnerability can be more comprehensive
The most of page for covering website, promotes the comprehensive of the loophole test result of final website.As it can be seen that the embodiment of the present invention provides
Website loophole test method, it can be achieved that website burden is lighter, and the comprehensive higher website vulnerability test of test result.
In conjunction with the loophole test method of website illustrated in fig. 2, the loophole that the embodiment of the present invention provides another website is surveyed
Method for testing may also include the steps of S114 after step sl 13, and signaling process figure is as shown in Figure 3:
S114, loophole test server export each URL to be measured according to the website vulnerability test result of each URL link to be measured
The test of link exports as a result, so that the website vulnerability test result to each URL link to be measured is verified;
Wherein, include the URL link to be measured, the URL link pair to be measured for the test of a URL link to be measured output result
The access request answered, the corresponding test URL link of the URL link to be measured, the parameter of the test URL link, the test URL link
At least one of the feedback result of Website server corresponding to corresponding access request and the test URL link.
In the loophole test method of website disclosed by the embodiments of the present invention, the specific implementation procedure of step S101~S113 with
Consistent disclosed in step S101~S113 in above-described embodiment, details are not described herein, refers to portion disclosed in above-described embodiment
Point.
As it can be seen that the loophole test method of website provided in an embodiment of the present invention is, it can be achieved that website burden is lighter, and tests knot
The comprehensive higher website vulnerability test of fruit, and realized to each URL link to be measured by exporting website vulnerability test result
Website vulnerability test result verified.
In conjunction with the loophole test method of website illustrated in fig. 2, the loophole that the embodiment of the present invention provides another website is surveyed
Method for testing may also include the steps of S115 between step S102 and step S103, and signaling process figure is as shown in Figure 4:
S115, proxy server distinguish the access request recorded according to the time interval that access request obtains,
Obtain the corresponding task names table of each time interval;Wherein, the task names table record has corresponding time interval to be recorded
Access request, time interval corresponds to a test period;
In executing step S115 implementation procedures, for the website that the part update cycle is short, for example, news website, needs
Periodic scan is carried out to the webpage of the website, proxy server is according to the time interval of the acquisition of access request to access request
It distinguishes, for example, 4 points to 6 points of system time is a sweep test period, then will be obtained in the sweep test period complete
Portion's access request distinguishes, and is recorded in sweep test period corresponding task names table.
" detecting website vulnerability test instruction " correspondingly, in step S103 includes:Reach current test in current time
When the initial time in period, website vulnerability test instruction is generated;" access request for transferring record " includes in step S103:It determines
The task names table of the corresponding time interval of current test period, the access recorded according to identified task names table are asked
It asks, determines transferred access request;
And " the task names table of the corresponding time interval of current test period is determined, according to identified in execution
The access request that is recorded of business title table, determines transferred access request " during this, it is preferred that for each task
The access request that title table is recorded then directly is transferred, and the access request transferred is marked if transferring for the first time;If
It is not to transfer for the first time, then deletes the access request tested being labeled in table.
In the loophole test method of website disclosed by the embodiments of the present invention, the specific implementation procedure of step S101~S113 with
Consistent disclosed in step S101~S113 in above-described embodiment, details are not described herein, refers to portion disclosed in above-described embodiment
Point.
As it can be seen that the loophole test method of website provided in an embodiment of the present invention is, it can be achieved that website burden is lighter, and tests knot
The comprehensive higher website vulnerability test of fruit, and proxy server by access request according to acquisition time interval into
Row is distinguished, and the specific aim of Hole Detection is enhanced.
In order to it will be apparent to those skilled in that understand understanding the present invention in content, now provide a scene embodiment
It is explained, the method flow diagram of the scene embodiment is as shown in Figure 5.
When user A uses one financial and economic news page of Sina's Client browse, the financial and economic news in Sina's client is clicked
Hyperlink;Sina's client receives financial and economic news access address, and generating corresponding financial and economic news according to access address accesses
Request, and is sent to Sina's Website server by the financial and economic news access request of generation, so that Sina's Website server is to Sina
Client feedback financial and economic news content of pages;
In Sina's Website server to after Sina's client feedback financial and economic news content of pages, the loophole of Sina website is surveyed
Test system carries out the website process of Hole Detection, and method flow diagram is as shown in figure 5, include the following steps:
S201, proxy server obtain the financial and economic news access request that Sina's client is sent to Sina's Website server,
Sina website's site server will be given in the financial and economic news access request again;Wherein, comprising extremely in the financial and economic news access request
The corresponding at least one uniform resource position mark URL link of the financial and economic news page;
S202, proxy server record proxy server and obtain financial and economic news access request;
S203, if loophole test server detects website vulnerability test instruction, the financial and economic news access for transferring record is asked
It asks, at least one URL link to be measured is determined from the corresponding URL link of financial and economic news access request transferred;
The parameter of the URL link to be measured is split, is obtained for a URL link to be measured by S204, loophole test server
To each fractionation parameter;
S205, loophole test server determine the controllable at least one target component of parameter value from each fractionation parameter, will
The parameter value of each target component replaces with the payload using website vulnerability;
S206, loophole test server replace with the target component of payload according to parameter value, generate the URL chains to be measured
Connect corresponding test URL link;
S207, loophole test server determine the corresponding financial and economic news of each URL link to be measured according to each test URL link
Content of pages;
In this scene embodiment, for a URL link to be measured, the corresponding test URL link of loophole test server comparison
The corresponding financial and economic news content of pages of the corresponding financial and economic news content of pages of test request and the URL link to be measured, and root
The website vulnerability test result of the URL link to be measured is determined according to comparing result;Specifically, if two financial and economic news content of pages
Unanimously, then illustrate the URL link to be measured without loophole;If two financial and economic news content of pages are inconsistent, illustrate the URL to be measured
It links leaky.
At this point, can also generate prompt message is sent to suggestion device, which can be warning light, and warning light dodges
User A can be prompted by sparkling, light or convert display color.
In conjunction with system architecture shown in figure 1, an embodiment of the present invention provides a kind of loopholes of website to test system, packet
It includes:Proxy server 20, database 30 and loophole test server 40;
Proxy server 20, is sent to the access request of Website server for obtaining client, and by acquired visit
It asks in request and is given to the Website server;The access request includes:The corresponding uniform resource position mark URL of Website server
Link;
Database 30, for recording each access request acquired in proxy server;
If loophole test server 40 transfers the visit of record for detecting website vulnerability test instruction from database
It asks request, at least one URL link to be measured is determined from the corresponding URL link of access request transferred;By each URL chains to be measured
The test URL link for being revised as having loophole test statement is connect, the corresponding test URL link of each URL link to be measured is obtained;According to
Each test URL link determines the website vulnerability test result of the corresponding URL link to be measured of each test URL link.
The embodiment of the present invention is sent to the access request of Website server by the client obtained during access agent,
Realize the loophole test of website, therefore can be in client in the normal access process of website, getting test website vulnerability institute
The URL link used, website only need to cope with normal access, and the flow burden of website is lighter.
Further, the Website page link that the URL link involved by the access request to website is covered more fully, is sent out
The probability for now hiding deeper URL link is higher, may make that URL link used in test website vulnerability can be more comprehensive
The most of page for covering website, promotes the comprehensive of the loophole test result of final website.As it can be seen that the embodiment of the present invention provides
Website loophole test system, it can be achieved that website burden is lighter, and the comprehensive higher website vulnerability test of test result.
Optionally, Fig. 6 further illustrates the hardware component of the loophole test system of website provided in an embodiment of the present invention
Schematic diagram, as shown in fig. 6, proxy server 20 may include:At least one processor 1, at least one communication interface 2, at least
One memory 3 and at least one communication bus 4;In embodiments of the present invention, processor 1, communication interface 2, memory 3, logical
Believe that the quantity of bus 4 can be at least one, and communication form is not limited to shown in Fig. 6, is only proxy server 20 shown in Fig. 6
A kind of optional hardware component way of realization;
In embodiments of the present invention, processor 1, communication interface 2, memory 3 complete mutual lead to by communication bus 4
Letter;
Optionally, communication interface 2 can be the interface of communication module, such as the interface of gsm module;
Processor 1 may be a central processor CPU or specific integrated circuit ASIC (Application
Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present invention
Road.
Memory 3 may include high-speed RAM memory, it is also possible to further include nonvolatile memory (non-volatile
Memory), a for example, at least magnetic disk storage.
Wherein, the processor 1 in proxy server 20 is particularly used in:
It obtains client and is sent to the access request of Website server, and the net will be given in acquired access request
Site server, and acquired each access request is recorded in database 30;The access request includes:Website server pair
The uniform resource position mark URL link answered.
As shown in fig. 6, loophole test server 40 may include:At least one processor 1 ', at least one communication interface
2 ', at least one processor 3 ' and at least one communication bus 4 ';In embodiments of the present invention, processor 1 ', communication interface 2 ',
Memory 3 ', communication bus 4 ' quantity can be at least one, and communication form is not limited to shown in Fig. 6, is only shown in Fig. 6
A kind of optional hardware component way of realization of loophole test server;
Association between processor 1 ', communication interface 2 ', memory 3 ' and communication bus 4 ' can refer to above description.
In embodiments of the present invention, the processor 1 ' in loophole test server 40 is particularly used in:
If detecting website vulnerability test instruction, the access request of record is transferred from database, from the access transferred
It asks to determine at least one URL link to be measured in corresponding URL link;Each URL link to be measured is revised as with loophole test
The test URL link of sentence obtains the corresponding test URL link of each URL link to be measured;According to each test URL link, determine each
Test the website vulnerability test result of the corresponding URL link to be measured of URL link.
Above-described embodiment is that the test of the loophole of website is belonged to what different servers was realized, but in practical application mistake
Cheng Zhong can be loaded into the same server in the form of process;The server can be in the loophole test for realizing website, mainly
Following flow is executed, method flow diagram is as shown in Figure 7:
S301 obtains client and is sent to the access request of Website server, and will be given in acquired access request
The Website server;The access request includes:The corresponding at least one uniform resource position mark URL chain of Website server
It connects;
S302 records acquired each access request;
S303 transfers the access request of record, from the access request pair transferred if detecting website vulnerability test instruction
At least one URL link to be measured is determined in the URL link answered;
S304, the test URL link for being revised as each URL link to be measured to have loophole test statement obtain each URL to be measured
Link corresponding test URL link;
S305 determines the website vulnerability test result of each URL link to be measured according to each test URL link.
Wherein, other functions realization of server can refer to corresponding portion description above.
Optionally, an embodiment of the present invention provides a kind of server, structural schematic diagram is as shown in figure 8, include:Access generation
It is true to manage module 101, logging modle 102, link determining module 103 to be measured, test link determining module 104 and loophole test result
Cover half block 105;
Access agent module 101 is sent to the access request of Website server for obtaining client, and will be acquired
The Website server is given in access request;The access request includes:The corresponding uniform resource locator of Website server
URL link;
Logging modle 102, for recording acquired each access request;
If link determining module 103 to be measured transfers the access request of record for detecting website vulnerability test instruction,
At least one URL link to be measured is determined from the corresponding URL link of access request transferred;
Test link determining module 104, for each URL link to be measured to be revised as the test with loophole test statement
URL link obtains the corresponding test URL link of each URL link to be measured;
Loophole test result determining module 105, for according to each test URL link, determining that each test URL link is corresponding
The website vulnerability test result of URL link to be measured.
Preferably, link determining module 103 to be measured, for being determined from the corresponding URL link of access request transferred
At least one URL link to be measured, specifically includes:
Duplicate removal processing is carried out to the corresponding URL link of the access request transferred;
According to the URL link after duplicate removal processing, candidate's URL link is determined;
Classification polymerization is carried out to candidate URL link, at least one URL link to be measured is determined from classification polymerization result.
Preferably, link determining module 103 to be measured is specifically included for carrying out classification polymerization to candidate URL link:
URL link with controllable parameter in the candidate URL link of analysis, and the URL link with controllable parameter is sorted out
Polymerization;
Link determining module 103 to be measured, for determining at least one URL link to be measured from classification polymerization result, specifically
Including:
The URL link with controllable parameter for sorting out polymerization is determined as at least one URL link to be measured.
Server described in above-mentioned any one, it is preferred that test link determining module 104 is used for each URL chains to be measured
The test URL link for being revised as having loophole test statement is connect, is specifically included:
For a URL link to be measured, the parameter of the URL link to be measured is split, obtains each fractionation parameter;
The controllable at least one target component of parameter value is determined from each fractionation parameter, and the parameter value of each target component is replaced
It is changed to the payload using website vulnerability;
The target component that payload is replaced with according to parameter value generates the corresponding test URL chains of the URL link to be measured
It connects.
Preferably, loophole test result determining module 105, for according to each test URL link, determining each test URL chains
The website vulnerability test result for connecing corresponding URL link to be measured, specifically includes:
The corresponding test request of each test URL link is sent to Website server, is corresponded to getting each test request
Feedback result;
For a URL link to be measured, according to the feedback result and the URL to be measured of the test request of corresponding test URL link
The feedback result of link determines the website vulnerability test result of the URL link to be measured.
Correspondingly, functional module framework shown in Fig. 8 may be disposed in server, can be realized by the server of the invention real
The loophole test function for the website that example is provided is applied, the hardware configuration of the server may include:At least one processor, at least
One communication interface, at least one processor and at least one communication bus;
Association between processor, communication interface, memory and communication bus can refer to above description.
Wherein, the processor in server can be specifically used for:
It obtains client and is sent to the access request of Website server, and the net will be given in acquired access request
Site server;The access request includes:The corresponding at least one uniform resource position mark URL link of the Website server;
The acquired each access request of record;
If detecting website vulnerability test instruction, the access request of record is transferred, it is corresponding from the access request transferred
At least one URL link to be measured is determined in URL link;
The test URL link for being revised as each URL link to be measured to have loophole test statement obtains each URL link to be measured
Corresponding test URL link;
According to each test URL link, the website vulnerability test result of each URL link to be measured is determined.
The embodiment of the present invention is sent to the access request of Website server by the client obtained during access agent,
Realize the loophole test of website, therefore can be in client in the normal access process of website, getting test website vulnerability institute
The URL link used, website only need to cope with normal access, and the flow burden of website is lighter.
Further, the Website page link that the URL link involved by the access request to website is covered more fully, is sent out
The probability for now hiding deeper URL link is higher, may make that URL link used in test website vulnerability can be more comprehensive
The most of page for covering website, promotes the comprehensive of the loophole test result of final website.As it can be seen that the embodiment of the present invention provides
Server, it can be achieved that website burden is lighter, and the comprehensive higher website vulnerability test of test result.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other
The difference of embodiment, just to refer each other for identical similar portion between each embodiment.For device disclosed in embodiment
For, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related place is said referring to method part
It is bright.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, depends on the specific application and design constraint of technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest range caused.
Claims (15)
1. a kind of loophole test method of website, which is characterized in that including:
It obtains client and is sent to the access request of Website server, and the website clothes will be given in acquired access request
Business device;The access request includes:The corresponding at least one uniform resource position mark URL link of the Website server;
The acquired each access request of record;
If detecting website vulnerability test instruction, the access request of record is transferred, from the corresponding URL chains of access request transferred
Connect at least one URL link to be measured of middle determination;
The test URL link for being revised as each URL link to be measured to have loophole test statement obtains each URL link to be measured and corresponds to
Test URL link;
According to each test URL link, the website vulnerability test result of each URL link to be measured is determined.
2. the loophole test method of website according to claim 1, which is characterized in that described from the access request transferred
Determine that at least one URL link to be measured includes in corresponding URL link:
Duplicate removal processing is carried out to the corresponding URL link of the access request transferred;
According to the URL link after duplicate removal processing, candidate's URL link is determined;
Classification polymerization is carried out to candidate URL link, at least one URL link to be measured is determined from classification polymerization result.
3. the loophole test method of website according to claim 2, which is characterized in that the URL chains according to after duplicate removal
It connects, determines that candidate's URL link includes:
It transfers and has tested URL link table, the URL link charting of having tested has the URL for having carried out website vulnerability test
Link;
URL link table is tested according to described, from the URL link after duplicate removal processing, removal has carried out website vulnerability test
URL link, obtain the candidate URL link.
4. the loophole test method of website according to claim 2, which is characterized in that described to the candidate URL link
Carrying out classification polymerization includes:
URL link with controllable parameter in the candidate URL link of analysis, and the not URL link of controllable parameter, will have controllable
The URL link of parameter sorts out polymerization, and the URL link of not controllable parameter is sorted out polymerization;
Determine that at least one URL link to be measured includes in the polymerization result from classification:
The URL link with controllable parameter for sorting out polymerization is determined as at least one URL link to be measured.
5. according to the loophole test method of claim 1-4 any one of them website, which is characterized in that it is described will be each to be measured
URL link is revised as having the test URL link of loophole test statement include:
For a URL link to be measured, the parameter of the URL link to be measured is split, obtains each fractionation parameter;
The controllable at least one target component of parameter value is determined from each fractionation parameter, and the parameter value of each target component is replaced with
Using the payload of website vulnerability;
The target component that payload is replaced with according to parameter value generates the corresponding test URL link of the URL link to be measured.
6. the loophole test method of website according to claim 1, which is characterized in that it is described according to each test URL link,
Determine that the website vulnerability test result of the corresponding URL link to be measured of each test URL link includes:
The corresponding test request of each test URL link is sent to the Website server, is corresponded to getting each test request
Feedback result;
For a URL link to be measured, according to the feedback result and the URL link to be measured of the test request of corresponding test URL link
Feedback result, determine the website vulnerability test result of the URL link to be measured.
7. the loophole test method of website according to claim 1, which is characterized in that the method further includes:
The access request for the carry out website vulnerability test transferred is marked;
The access request for transferring record includes:
Not labeled access request is transferred from the access request recorded.
8. the loophole test method of website according to claim 1, which is characterized in that the acquisition client is sent to net
The access request of site server includes:
Basis basic certifications are carried out to the client to obtain the client if certification passes through and be sent to Website server
Access request.
9. the loophole test method of website according to claim 1, which is characterized in that the method further includes:
The access request recorded is distinguished according to the time interval that access request obtains, it is corresponding to obtain each time interval
Task names table;Wherein, the task names table record has the access request that corresponding time interval is recorded, a time zone
Between a corresponding test period;
It is described to detect that website vulnerability test instruction includes:
When current time reaches the initial time of current test period, website vulnerability test instruction is generated;
The access request for transferring record includes:
The task names table for determining the corresponding time interval of current test period is recorded according to identified task names table
Access request determines transferred access request.
10. the loophole test method of website according to claim 1, which is characterized in that further include:
According to the website vulnerability test result of each URL link to be measured, export the test output of each URL link to be measured as a result, so as to
The website vulnerability test result of each URL link to be measured is verified;
Wherein, the test output result of a URL link to be measured includes:The URL link to be measured, the corresponding visit of the URL link to be measured
Ask request, the corresponding test URL link of the URL link to be measured, the parameter of the test URL link, the test URL link is corresponding
At least one of the feedback result of Website server corresponding to access request and the test URL link.
11. a kind of server, which is characterized in that including:
Access agent module is sent to the access request of Website server for obtaining client, and acquired access is asked
The Website server is given in asking;The access request includes:The corresponding uniform resource position mark URL of the Website server
Link;
Logging modle, for recording acquired each access request;
If link determining module to be measured transfers the access request of record, from being transferred for detecting website vulnerability test instruction
The corresponding URL link of access request in determine at least one URL link to be measured;
Test link determining module, the test URL link for being revised as each URL link to be measured that there is loophole test statement,
Obtain the corresponding test URL link of each URL link to be measured;
Loophole test result determining module, for according to each test URL link, determining the corresponding URL to be measured of each test URL link
The website vulnerability test result of link.
12. server according to claim 11, which is characterized in that the link determining module to be measured, for from being adjusted
At least one URL link to be measured is determined in the corresponding URL link of access request taken, is specifically included:
Duplicate removal processing is carried out to the corresponding URL link of the access request transferred;
According to the URL link after duplicate removal processing, candidate's URL link is determined;
Classification polymerization is carried out to candidate URL link, at least one URL link to be measured is determined from classification polymerization result.
13. according to claim 11-12 any one of them servers, which is characterized in that the test links determining module, uses
In the test URL link for being revised as each URL link to be measured that there is loophole test statement, specifically include:
For a URL link to be measured, the parameter of the URL link to be measured is split, obtains each fractionation parameter;
The controllable at least one target component of parameter value is determined from each fractionation parameter, and the parameter value of each target component is replaced with
Using the payload of website vulnerability;
The target component that payload is replaced with according to parameter value generates the corresponding test URL link of the URL link to be measured.
14. server according to claim 11, which is characterized in that the loophole test result determining module is used for root
According to each test URL link, the website vulnerability test result of the corresponding URL link to be measured of each test URL link is determined, it is specific to wrap
It includes:
The corresponding test request of each test URL link is sent to the Website server, is corresponded to getting each test request
Feedback result;
For a URL link to be measured, according to the feedback result and the URL link to be measured of the test request of corresponding test URL link
Feedback result, determine the website vulnerability test result of the URL link to be measured.
15. a kind of loophole of website tests system, which is characterized in that including:
Proxy server, is sent to the access request of Website server for obtaining client, and by acquired access request
In be given to the Website server;The access request includes:The corresponding uniform resource position mark URL chain of the Website server
It connects;
Database, for recording each access request acquired in the proxy server;
If loophole test server transfers the access of record from the database for detecting website vulnerability test instruction
Request determines at least one URL link to be measured from the corresponding URL link of access request transferred;By each URL link to be measured
It is revised as the test URL link with loophole test statement, obtains the corresponding test URL link of each URL link to be measured;According to each
URL link is tested, determines the website vulnerability test result of the corresponding URL link to be measured of each test URL link.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710197801.5A CN108667770B (en) | 2017-03-29 | 2017-03-29 | Website vulnerability testing method, server and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710197801.5A CN108667770B (en) | 2017-03-29 | 2017-03-29 | Website vulnerability testing method, server and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108667770A true CN108667770A (en) | 2018-10-16 |
CN108667770B CN108667770B (en) | 2020-12-18 |
Family
ID=63786108
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710197801.5A Active CN108667770B (en) | 2017-03-29 | 2017-03-29 | Website vulnerability testing method, server and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108667770B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109508548A (en) * | 2018-11-19 | 2019-03-22 | 四川长虹电器股份有限公司 | A kind of threat behavior gathering system and method based on emulator technology |
CN109740355A (en) * | 2019-01-03 | 2019-05-10 | 深圳前海微众银行股份有限公司 | Vulnerability scanning method, server, system and proxy server |
CN109818928A (en) * | 2018-12-25 | 2019-05-28 | 北京奇安信科技有限公司 | A kind of network security detection method, system, electronic equipment and medium |
CN109981653A (en) * | 2019-03-28 | 2019-07-05 | 上海中通吉网络技术有限公司 | A kind of web vulnerability scanning method |
CN111240882A (en) * | 2020-01-16 | 2020-06-05 | 深圳开源互联网安全技术有限公司 | Method and system for detecting abnormal state |
WO2020233022A1 (en) * | 2019-05-21 | 2020-11-26 | 平安科技(深圳)有限公司 | Vulnerability detection method and apparatus, computer device, and storage medium |
CN112306840A (en) * | 2019-07-24 | 2021-02-02 | 厦门白山耘科技有限公司 | URL test case generation method and device |
CN114138661A (en) * | 2021-12-08 | 2022-03-04 | 国家工业信息安全发展研究中心 | Dynamic security detection method and system for test target |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8239952B1 (en) * | 2007-02-01 | 2012-08-07 | Mcafee, Inc. | Method and system for detection of remote file inclusion vulnerabilities |
CN102664876A (en) * | 2012-04-10 | 2012-09-12 | 星云融创(北京)科技有限公司 | Method and system for detecting network security |
CN103023710A (en) * | 2011-09-21 | 2013-04-03 | 阿里巴巴集团控股有限公司 | Safety test system and method |
CN103268361A (en) * | 2013-06-07 | 2013-08-28 | 百度在线网络技术(北京)有限公司 | Extracting method, device and system of hidden URL (Uniform Resource Locator) in webpage |
CN104144142A (en) * | 2013-05-07 | 2014-11-12 | 阿里巴巴集团控股有限公司 | Web vulnerability discovery method and system |
CN104468459A (en) * | 2013-09-12 | 2015-03-25 | 深圳市腾讯计算机系统有限公司 | Vulnerability detection method and apparatus |
CN104573520A (en) * | 2013-10-09 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Method and device for detecting permanent type cross site scripting vulnerability |
CN104765682A (en) * | 2015-03-30 | 2015-07-08 | 微梦创科网络科技(中国)有限公司 | Offline detection method and system for cross-site scripting vulnerability |
CN104980309A (en) * | 2014-04-11 | 2015-10-14 | 北京奇虎科技有限公司 | Website security detecting method and device |
CN105049440A (en) * | 2015-08-06 | 2015-11-11 | 福建天晴数码有限公司 | Method and system for detecting cross-site scripting attack injection |
CN105357195A (en) * | 2015-10-30 | 2016-02-24 | 深圳市深信服电子科技有限公司 | Unauthorized web access vulnerability detecting method and device |
CN105404816A (en) * | 2015-12-24 | 2016-03-16 | 北京奇虎科技有限公司 | Content-based vulnerability detection method and device |
CN106302337A (en) * | 2015-05-22 | 2017-01-04 | 腾讯科技(深圳)有限公司 | leak detection method and device |
CN106412975A (en) * | 2016-09-30 | 2017-02-15 | 中国联合网络通信集团有限公司 | Content charging vulnerability test methods, and apparatuses |
-
2017
- 2017-03-29 CN CN201710197801.5A patent/CN108667770B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8239952B1 (en) * | 2007-02-01 | 2012-08-07 | Mcafee, Inc. | Method and system for detection of remote file inclusion vulnerabilities |
CN103023710A (en) * | 2011-09-21 | 2013-04-03 | 阿里巴巴集团控股有限公司 | Safety test system and method |
CN102664876A (en) * | 2012-04-10 | 2012-09-12 | 星云融创(北京)科技有限公司 | Method and system for detecting network security |
CN104144142A (en) * | 2013-05-07 | 2014-11-12 | 阿里巴巴集团控股有限公司 | Web vulnerability discovery method and system |
CN103268361A (en) * | 2013-06-07 | 2013-08-28 | 百度在线网络技术(北京)有限公司 | Extracting method, device and system of hidden URL (Uniform Resource Locator) in webpage |
CN104468459A (en) * | 2013-09-12 | 2015-03-25 | 深圳市腾讯计算机系统有限公司 | Vulnerability detection method and apparatus |
CN104573520A (en) * | 2013-10-09 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Method and device for detecting permanent type cross site scripting vulnerability |
CN104980309A (en) * | 2014-04-11 | 2015-10-14 | 北京奇虎科技有限公司 | Website security detecting method and device |
CN104765682A (en) * | 2015-03-30 | 2015-07-08 | 微梦创科网络科技(中国)有限公司 | Offline detection method and system for cross-site scripting vulnerability |
CN106302337A (en) * | 2015-05-22 | 2017-01-04 | 腾讯科技(深圳)有限公司 | leak detection method and device |
CN105049440A (en) * | 2015-08-06 | 2015-11-11 | 福建天晴数码有限公司 | Method and system for detecting cross-site scripting attack injection |
CN105357195A (en) * | 2015-10-30 | 2016-02-24 | 深圳市深信服电子科技有限公司 | Unauthorized web access vulnerability detecting method and device |
CN105404816A (en) * | 2015-12-24 | 2016-03-16 | 北京奇虎科技有限公司 | Content-based vulnerability detection method and device |
CN106412975A (en) * | 2016-09-30 | 2017-02-15 | 中国联合网络通信集团有限公司 | Content charging vulnerability test methods, and apparatuses |
Non-Patent Citations (2)
Title |
---|
AMATUL MOHOSINA: "DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations", 《2012 IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY》 * |
胡志伟: "WEB应用安全漏洞扫描系统的设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109508548A (en) * | 2018-11-19 | 2019-03-22 | 四川长虹电器股份有限公司 | A kind of threat behavior gathering system and method based on emulator technology |
CN109818928A (en) * | 2018-12-25 | 2019-05-28 | 北京奇安信科技有限公司 | A kind of network security detection method, system, electronic equipment and medium |
CN109740355A (en) * | 2019-01-03 | 2019-05-10 | 深圳前海微众银行股份有限公司 | Vulnerability scanning method, server, system and proxy server |
CN109981653A (en) * | 2019-03-28 | 2019-07-05 | 上海中通吉网络技术有限公司 | A kind of web vulnerability scanning method |
CN109981653B (en) * | 2019-03-28 | 2021-07-23 | 上海中通吉网络技术有限公司 | Web vulnerability scanning method |
WO2020233022A1 (en) * | 2019-05-21 | 2020-11-26 | 平安科技(深圳)有限公司 | Vulnerability detection method and apparatus, computer device, and storage medium |
CN112306840A (en) * | 2019-07-24 | 2021-02-02 | 厦门白山耘科技有限公司 | URL test case generation method and device |
CN112306840B (en) * | 2019-07-24 | 2022-09-30 | 厦门白山耘科技有限公司 | URL test case generation method and device |
CN111240882A (en) * | 2020-01-16 | 2020-06-05 | 深圳开源互联网安全技术有限公司 | Method and system for detecting abnormal state |
CN114138661A (en) * | 2021-12-08 | 2022-03-04 | 国家工业信息安全发展研究中心 | Dynamic security detection method and system for test target |
CN114138661B (en) * | 2021-12-08 | 2022-08-05 | 国家工业信息安全发展研究中心 | Dynamic security detection method and system for test target |
Also Published As
Publication number | Publication date |
---|---|
CN108667770B (en) | 2020-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108667770A (en) | A kind of loophole test method, server and the system of website | |
US10567407B2 (en) | Method and system for detecting malicious web addresses | |
CN104348803B (en) | Link kidnaps detection method, device, user equipment, Analysis server and system | |
CN103888490B (en) | A kind of man-machine knowledge method for distinguishing of full automatic WEB client side | |
CN110413908B (en) | Method and device for classifying uniform resource locators based on website content | |
CN103023710B (en) | A kind of safety test system and method | |
US8281401B2 (en) | System for detecting vulnerabilities in web applications using client-side application interfaces | |
CN103679031B (en) | A kind of immune method and apparatus of file virus | |
US20110191664A1 (en) | Systems for and methods for detecting url web tracking and consumer opt-out cookies | |
US20220188402A1 (en) | Real-Time Detection and Blocking of Counterfeit Websites | |
CN109039987A (en) | A kind of user account login method, device, electronic equipment and storage medium | |
CN103607385A (en) | Method and apparatus for security detection based on browser | |
CN104468592B (en) | Login method and login system | |
KR20090090685A (en) | Method and system for determining vulnerability of web application | |
CN109981664A (en) | Website logging method, device and the realization device of page end | |
CN109450879A (en) | User access activity monitoring method, electronic device and computer readable storage medium | |
CN106897336A (en) | Web page files sending method, webpage rendering intent and device, webpage rendering system | |
CN107463844B (en) | WEB Trojan horse detection method and system | |
CN104956372A (en) | Determining coverage of dynamic security scans using runtime and static code analyses | |
US8789177B1 (en) | Method and system for automatically obtaining web page content in the presence of redirects | |
CN112703496A (en) | Content policy based notification of application users about malicious browser plug-ins | |
CN109347882A (en) | Webpage Trojan horse monitoring method, device, equipment and storage medium | |
CN108632219A (en) | A kind of website vulnerability detection method, detection service device and system | |
CN113518077A (en) | Malicious web crawler detection method, device, equipment and storage medium | |
KR20180075881A (en) | Method and Apparatus for Analyzing Web Vulnerability for Client-side |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |