CN110392024A - A kind of page detection method is set with scanning engine - Google Patents

A kind of page detection method is set with scanning engine Download PDF

Info

Publication number
CN110392024A
CN110392024A CN201810359247.0A CN201810359247A CN110392024A CN 110392024 A CN110392024 A CN 110392024A CN 201810359247 A CN201810359247 A CN 201810359247A CN 110392024 A CN110392024 A CN 110392024A
Authority
CN
China
Prior art keywords
module
scanning engine
script
hole detection
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810359247.0A
Other languages
Chinese (zh)
Inventor
李娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810359247.0A priority Critical patent/CN110392024A/en
Publication of CN110392024A publication Critical patent/CN110392024A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention relates to a kind of page detection methods, determine the receivable parameter-value of webpage to set;And be the parameter-value to each parameter-value pair in set: construction inserts the parameter-value pair of particular script in value, the website URL to be scanned is set, start scanning engine module, the URL detected to needs is constructed and is sent HTTP request, and receive http response, it is stored in scanning engine module, executes corresponding Hole Detection script module;Hole Detection script module passes through API from scanning engine module, the data of the HTTP request and response that are saved in obtaining step C, the website detected needed for judgement whether there is loophole, the source code of the data of the HTTP request and response that are saved in analytical procedure C, check whether that there are malicious acts, judge whether the webpage is malicious web pages according to the scanning result of each scanning engine, Hole Detection strategy is realized with scripting language and can be detected whether as malicious websites.

Description

A kind of page detection method is set with scanning engine
Technical field
The present invention relates to webpage visit application fields more particularly to a kind of page detection method to set with scanning engine.
Background technique
With the development of internet, various network applications emerge one after another, and while realizing various functions, have also been introduced Various security breaches, provide convenience to attacker.For the continuous growth of web portal security demand, there are many website vulnerabilities Scanner, URL " creeping " entire website that scanner would generally be provided according to user, page download be got off, then by webpage Content detected, analyze with check in webpage whether leaky presence.
But nearly all scanner all suffers from such problems: (1) loophole is varied, for the detection of different loopholes Method is again different, how to rationally design scanner, various loopholes can be supported to greatest extent? (2) internet is one The industry of a high speed development all might have new network station leakage at any time and generate, and how quickly extension sweeps Device is retouched to support new Hole Detection scheme?
Existing scanner is used to describe the inspection policies of each loophole using static configuration file mostly.But it is common Configuration file often lacks flexibility, can not quickly extend, and is also not easy to security study personnel use.
Summary of the invention
The purpose of the present invention is to provide a kind of to realize Hole Detection strategy with scripting language and can detect whether to dislike A kind of page detection method of meaning website is set with scanning engine.
To achieve the above object, the invention provides the following technical scheme: a kind of page detection method, specifically includes following steps It is rapid:
Step A: determine the receivable parameter-value of webpage to set;It and is the parameter-value to each ginseng in set Number-value pair: construction inserts the parameter-value pair of particular script in value;
The website URL to be scanned is arranged in step B, selects the website security breaches type to be detected;
Step C: starting scanning engine module, the URL detected to needs construct and send HTTP request, and receive HTTP and ring It answers;
Step D: by all data of HTTP request and response in step C, it is stored in scanning engine module;
Step E: the security breaches type selected according to user executes corresponding Hole Detection script module respectively;Loophole Data of the detection script module by the API HTTP request and response saved from scanning engine module, obtaining step C, loophole Detecting the website detected needed for script module can judge according to the data of acquisition whether there is loophole.
Step F: the source code of the data of the HTTP request and response that save in analytical procedure C parses the mark of the webpage Label;
Step G: each label parsed is input in corresponding different scanning engine according to different type and is swept It retouches, checks whether that there are malicious acts;
Step H: judge whether the webpage is malicious web pages according to the scanning result of each scanning engine.
Further, in step E, Hole Detection script module can also be constructed by API, send new HTTP request, and Further Hole Detection is carried out according to obtained response.
Further, the website vulnerability scan method based on script can configure which loophole inspection is each scan task enable Script is surveyed, user at any time, can choose and detect all loopholes, can also only select the loophole of a part, only use The loophole of family selection, corresponding script can be just performed.
A kind of scanning engine of page detection method is set, including scanning engine module and Hole Detection script module, described Scanning engine module is able to achieve following function:
(1) HTTP request is constructed and sent, http response is received;
(2) runtime environment of scripting language is provided;
(3) calling interface is provided to shell script, the function of allowing scripting language that engine is used to provide;
The function (1) is realized by the HTTP send and receive packets module of scanning engine inside modules;Scanning engine inside modules Equipped with HTTP send and receive packets module, is sent for simulation browser, receives HTTP request;
The function (2) is realized by runtime environment module;Scanning engine inside modules are equipped with runtime environment module, It is the module that script program operation is relied on;
In the function (3), scanning engine module provides interface to Hole Detection script, and physical interface includes:
Interface a: obtaining and need the target webpage URL that scans, the mode for obtaining target webpage URL include manually enter, from Existing url list or any database for storing URL are imported, are obtained by network packet capturing, are imported from website crawler;
Interface b: obtaining the corresponding HTMLDom information of content of pages, and HTMLDom information includes link, button, list, table Single element, text, script;
Interface c: the related data of the HTTP request of scanning engine module, including Cookie, session, HTTP, one are obtained Time used in secondary request;
Interface d: the request of construction, transmission HTTP receives corresponding http response to scanned website, can be arranged The each section content of HTTP request, including Cookie, HTTP head;
Interface e: the vulnerability information that will be seen that is reported to scanning engine module, and feeds back display;The Hole Detection script Module is interacted by the interface realization in scanning engine module with scanning engine module, and each Hole Detection script module is for examining The loophole of a classification is surveyed, and is independently executed between different Hole Detection script modules, testing result is not generated and influenced each other; Hole Detection script module carries out Hole Detection to the page of the website of required detection respectively, if detection springs a leak, loophole inspection It surveys script module and the vulnerability information of acquisition is returned into scanning engine module;Vulnerability information includes: the URL to start a leak, loophole Title, the detailed description of loophole, loophole reparation suggestion;When Hole Detection script module carries out Hole Detection, by near A kind of few leak detection method carries out page Hole Detection with combined in any order, and specific leak detection method includes:
Method a: according to be detected URL request answer code, HTTP, the text of session and Cookie, response contents it is long Degree, response time length, judge whether the feature for meeting loophole;
Method b: it in the page response content for being detected URL, according to the needs of vulnerability detection logic, carries out text and looks into It looks for, the mode of asterisk wildcard or regular expression matching, and judges whether according to matching result the feature for meeting loophole;
Method c: it in the page response content for being detected URL, according to the needs of vulnerability detection logic, extracts in specific Hold, judges whether the feature for meeting loophole;Specific content includes link, list, Form Element, button, annotation, text, mark Label, tag attributes, script, CSS definition;
Method d: providing customized dictionary file, successively extracts the content in dictionary file, is used for Hole Detection, content Including each word, word, line of text;
Method e: during Hole Detection script module carries out Hole Detection, at least one new HTTP request is constructed Packet, according to the needs of vulnerability detection logic, together by new HTTP request packet and the request packet of parent page, for answer code, Page length, HTTP, the otherness of content of pages etc. compare and for content extraction and matching;Hole Detection script According to otherness compare or content matching as a result, judging whether there is loophole.
Further, the Hole Detection script module allows website of the user according to required detection, the leakage of custom writing Script is detected in hole, for detecting the specific safety problem of user.
Further, the Hole Detection script can be realized using various scripting languages, and operated in the scanning engine and mentioned In the Hole Detection script runtime environment module of confession.
Further, the Hole Detection script module is stored the vulnerability information of acquisition by scanning engine module And output.
Compared with prior art, the beneficial effects of the present invention are:
1. a kind of page detection method provided by the present invention is set with scanning engine, scans the detection logical AND of loophole and draw The degree of coupling both holding up separation, reduce, the logic of Hole Detection realized by Hole Detection script, scanning engine realize it is general, Not particular to the basic function of certain a kind of loophole.Such advantage is that entire website vulnerability scanning system is allowed to be easy to extend, Can strategy detection script very easily be write for newfound loophole.
2. analyzing the source code of webpage, the label of the webpage is parsed, by each label parsed according to different type It is input in corresponding different scanning engine and is scanned, check whether there are malicious act, according to the scanning of each scanning engine As a result judge the webpage whether be malicious web pages technical solution, due to parsing the label of webpage, by different types of mark It signs and is scanned respectively in corresponding different scanning engine of input, improve the efficiency of webpage detection, and due to not Same scanning engine is all targetedly scanned corresponding label, improves the accuracy of judgement.
Detailed description of the invention
Fig. 1 is the general frame flowage structure schematic diagram that a kind of page detection method and scanning engine of the present invention are set.
Fig. 2 is the structural schematic diagram that a kind of page detection method and scanning engine of the present invention are set.
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples.
Embodiment:
As shown in Figure 1, described in the embodiment of the present invention to achieve the above object, the invention provides the following technical scheme: one Kind page detection method, specifically include the following steps:
Step A: determine the receivable parameter-value of webpage to set;It and is the parameter-value to each ginseng in set Number-value pair: construction inserts the parameter-value pair of particular script in value;
The website URL to be scanned is arranged in step B, selects the website security breaches type to be detected;
Step C: starting scanning engine module, the URL detected to needs construct and send HTTP request, and receive HTTP and ring It answers;
Step D: by all data of HTTP request and response in step C, it is stored in scanning engine module;
Step E: the security breaches type selected according to user executes corresponding Hole Detection script module respectively;Loophole Data of the detection script module by the API HTTP request and response saved from scanning engine module, obtaining step C, loophole Detecting the website detected needed for script module can judge according to the data of acquisition whether there is loophole.
Step F: the source code of the data of the HTTP request and response that save in analytical procedure C parses the mark of the webpage Label;
Step G: each label parsed is input in corresponding different scanning engine according to different type and is swept It retouches, checks whether that there are malicious acts;
Step H: judge whether the webpage is malicious web pages according to the scanning result of each scanning engine.
Further, in step E, Hole Detection script module can also be constructed by API, send new HTTP request, and Further Hole Detection is carried out according to obtained response.
Further, the website vulnerability scan method based on script can configure which loophole inspection is each scan task enable Script is surveyed, user at any time, can choose and detect all loopholes, can also only select the loophole of a part, only use The loophole of family selection, corresponding script can be just performed.
As shown in Fig. 2, a kind of scanning engine of page detection method is set, including scanning engine module and Hole Detection script Module, the scanning engine module are able to achieve following function:
(1) HTTP request is constructed and sent, http response is received;
(2) runtime environment of scripting language is provided;
(3) calling interface is provided to shell script, the function of allowing scripting language that engine is used to provide;
The function (1) is realized by the HTTP send and receive packets module of scanning engine inside modules;Scanning engine inside modules Equipped with HTTP send and receive packets module, is sent for simulation browser, receives HTTP request;
The function (2) is realized by runtime environment module;Scanning engine inside modules are equipped with runtime environment module, It is the module that script program operation is relied on;
In the function (3), scanning engine module provides interface to Hole Detection script, and physical interface includes:
Interface a: obtaining and need the target webpage URL that scans, the mode for obtaining target webpage URL include manually enter, from Existing url list or any database for storing URL are imported, are obtained by network packet capturing, are imported from website crawler;
Interface b: obtaining the corresponding HTMLDom information of content of pages, and HTMLDom information includes link, button, list, table Single element, text, script;
Interface c: the related data of the HTTP request of scanning engine module, including Cookie, session, HTTP, one are obtained Time used in secondary request;
Interface d: the request of construction, transmission HTTP receives corresponding http response to scanned website, can be arranged The each section content of HTTP request, including Cookie, HTTP head;
Interface e: the vulnerability information that will be seen that is reported to scanning engine module, and feeds back display;The Hole Detection script Module is interacted by the interface realization in scanning engine module with scanning engine module, and each Hole Detection script module is for examining The loophole of a classification is surveyed, and is independently executed between different Hole Detection script modules, testing result is not generated and influenced each other; Hole Detection script module carries out Hole Detection to the page of the website of required detection respectively, if detection springs a leak, loophole inspection It surveys script module and the vulnerability information of acquisition is returned into scanning engine module;Vulnerability information includes: the URL to start a leak, loophole Title, the detailed description of loophole, loophole reparation suggestion;When Hole Detection script module carries out Hole Detection, by near A kind of few leak detection method carries out page Hole Detection with combined in any order, and specific leak detection method includes:
Method a: according to be detected URL request answer code, HTTP, the text of session and Cookie, response contents it is long Degree, response time length, judge whether the feature for meeting loophole;
Method b: it in the page response content for being detected URL, according to the needs of vulnerability detection logic, carries out text and looks into It looks for, the mode of asterisk wildcard or regular expression matching, and judges whether according to matching result the feature for meeting loophole;
Method c: it in the page response content for being detected URL, according to the needs of vulnerability detection logic, extracts in specific Hold, judges whether the feature for meeting loophole;Specific content includes link, list, Form Element, button, annotation, text, mark Label, tag attributes, script, CSS definition;
Method d: providing customized dictionary file, successively extracts the content in dictionary file, is used for Hole Detection, content Including each word, word, line of text;
Method e: during Hole Detection script module carries out Hole Detection, at least one new HTTP request is constructed Packet, according to the needs of vulnerability detection logic, together by new HTTP request packet and the request packet of parent page, for answer code, Page length, HTTP, the otherness of content of pages etc. compare and for content extraction and matching;Hole Detection script According to otherness compare or content matching as a result, judging whether there is loophole.
The Hole Detection script module allows website of the user according to required detection, the Hole Detection foot of custom writing This, for detecting the specific safety problem of user, the Hole Detection script can be realized using various scripting languages, and be operated in In the Hole Detection script runtime environment module that the scanning engine provides, the Hole Detection script module is by the leakage of acquisition Hole information is stored and is exported by scanning engine module.
A kind of page detection method provided by the present embodiment is set with scanning engine, is scanned the detection logical AND of loophole and is drawn The degree of coupling both holding up separation, reduce, the logic of Hole Detection realized by Hole Detection script, scanning engine realize it is general, Not particular to the basic function of certain a kind of loophole.Such advantage is that entire website vulnerability scanning system is allowed to be easy to extend, Strategy detection script very easily can be write for newfound loophole, analyze the source code of webpage, parse the webpage Label, each label parsed is input in corresponding different scanning engine according to different type and is scanned, is checked With the presence or absence of malicious act, according to the scanning result of each scanning engine judge the webpage whether be malicious web pages technical side Case, due to parsing the label of webpage, in corresponding different scanning engine that different types of label is inputted respectively into Row scanning, improve webpage detection efficiency, and due to different scanning engines all targetedly to corresponding label into Row scanning, improves the accuracy of judgement.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the technical principles of the invention, several improvements and modifications can also be made, these improvements and modifications Also it should be regarded as protection scope of the present invention.

Claims (7)

1. a kind of page detection method, which is characterized in that specifically include the following steps:
Step A: determine the receivable parameter-value of webpage to set;It and is the parameter-value to each parameter-in set Value pair: construction inserts the parameter-value pair of particular script in value;
Step B: the setting website URL to be scanned selects the website security breaches type to be detected;
Step C: starting scanning engine module, the URL detected to needs constructs and sends HTTP request, and receives http response;
Step D: by all data of HTTP request and response in step C, it is stored in scanning engine module;
Step E: the security breaches type selected according to user executes corresponding Hole Detection script module respectively;Hole Detection Data of the script module by the API HTTP request and response saved from scanning engine module, obtaining step C, Hole Detection The website that script module detects needed for capable of being judged according to the data of acquisition whether there is loophole.
Step F: the source code of the data of the HTTP request and response that save in analytical procedure C parses the label of the webpage;
Step G: each label parsed is input in corresponding different scanning engine according to different type and is scanned, is looked into It sees with the presence or absence of malicious act;
Step H: judge whether the webpage is malicious web pages according to the scanning result of each scanning engine.
2. a kind of page detection method according to claim 1, which is characterized in that in step E, Hole Detection script module It can also be constructed by API, send new HTTP request, and further Hole Detection is carried out according to obtained response.
3. a kind of page detection method according to claim 1, which is characterized in that the website vulnerability based on script is swept The method of retouching can configure which Hole Detection script is each scan task enable, and user at any time, it is all to can choose detection Loophole, can also only select the loophole of a part, the only loophole of user's selection, corresponding script can just be performed.
4. a kind of scanning engine of page detection method according to claim 1 is set, including scanning engine module and leakage Detect script module in hole, which is characterized in that the scanning engine module is able to achieve following function:
(1) HTTP request is constructed and sent, http response is received;
(2) runtime environment of scripting language is provided;
(3) calling interface is provided to shell script, the function of allowing scripting language that engine is used to provide;
The function (1) is realized by the HTTP send and receive packets module of scanning engine inside modules;Scanning engine inside modules are equipped with HTTP send and receive packets module sends for simulation browser, receives HTTP request;
The function (2) is realized by runtime environment module;Scanning engine inside modules are equipped with runtime environment module, are feet This program runs relied on module;
In the function (3), scanning engine module provides interface to Hole Detection script, and physical interface includes:
Interface a: obtaining and need the target webpage URL that scans, and the mode for obtaining target webpage URL includes manually entering, from existing Url list or it is any store URL database import, by network packet capturing obtain, from website crawler import;
Interface b: obtaining the corresponding HTMLDom information of content of pages, and HTMLDom information includes link, button, list, table unit Element, text, script;
Interface c: obtain scanning engine module HTTP request related data, including Cookie, session, HTTP, once ask Ask the time used;
Interface d: the request of construction, transmission HTTP receives corresponding http response to scanned website, and HTTP can be arranged and ask The each section content asked, including Cookie, HTTP head;
Interface e: the vulnerability information that will be seen that is reported to scanning engine module, and feeds back display;The Hole Detection script module It is realized by the interface in scanning engine module and is interacted with scanning engine module, each Hole Detection script module is for detecting one The loophole of a classification, and independently executed between different Hole Detection script modules, testing result is not generated and is influenced each other;Loophole It detects script module and Hole Detection is carried out to the page of the website of required detection respectively, if detection springs a leak, Hole Detection foot The vulnerability information of acquisition is returned to scanning engine module by this module;Vulnerability information includes: the URL to start a leak, the name of loophole The reparation suggestion of title, the detailed description of loophole, loophole;When Hole Detection script module carries out Hole Detection, by will at least one Kind of leak detection method carries out page Hole Detection with combined in any order, and specific leak detection method includes:
Method a: the request answer code of the detected URL of foundation, HTTP, session and Cookie, the text size of response contents, sound Length of time is answered, judges whether the feature for meeting loophole;
Method b: it in the page response content for being detected URL, according to the needs of vulnerability detection logic, carries out String searching, lead to Mode with symbol or regular expression matching, and judge whether according to matching result the feature for meeting loophole;
Method c: in the page response content for being detected URL, according to the needs of vulnerability detection logic, extracting specific content, Judge whether the feature for meeting loophole;Specific content include link, list, Form Element, button, annotation, text, label, Tag attributes, script, CSS definition;
Method d: providing customized dictionary file, successively extracts the content in dictionary file, is used for Hole Detection, content includes Each word, word, line of text;
Method e: during Hole Detection script module carries out Hole Detection, at least one new HTTP request packet, root are constructed It is together by new HTTP request packet and the request packet of parent page, long for answer code, the page according to the needs of vulnerability detection logic Degree, HTTP, the otherness comparison of content of pages etc. and extraction and matching for content;Hole Detection script is according to difference The opposite sex compare or content matching as a result, judging whether there is loophole.
5. a kind of scanning engine of page detection method according to claim 4 is set, which is characterized in that the Hole Detection Script module allows website of the user according to required detection, and the Hole Detection script of custom writing is specific for detecting user Safety problem.
6. a kind of scanning engine of page detection method according to claim 4 is set, which is characterized in that the Hole Detection Script can be realized using various scripting languages, and operate in the Hole Detection script runtime environment mould that the scanning engine provides In block.
7. a kind of scanning engine of page detection method according to claim 4 is set, which is characterized in that the Hole Detection Script module is stored and is exported by the vulnerability information of acquisition, by scanning engine module.
CN201810359247.0A 2018-04-20 2018-04-20 A kind of page detection method is set with scanning engine Withdrawn CN110392024A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810359247.0A CN110392024A (en) 2018-04-20 2018-04-20 A kind of page detection method is set with scanning engine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810359247.0A CN110392024A (en) 2018-04-20 2018-04-20 A kind of page detection method is set with scanning engine

Publications (1)

Publication Number Publication Date
CN110392024A true CN110392024A (en) 2019-10-29

Family

ID=68283675

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810359247.0A Withdrawn CN110392024A (en) 2018-04-20 2018-04-20 A kind of page detection method is set with scanning engine

Country Status (1)

Country Link
CN (1) CN110392024A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111277601A (en) * 2020-01-22 2020-06-12 奇安信科技集团股份有限公司 Website security monitoring method and system
CN111447224A (en) * 2020-03-26 2020-07-24 江苏亨通工控安全研究院有限公司 Web vulnerability scanning method and vulnerability scanner
CN111475763A (en) * 2020-04-15 2020-07-31 成都安易迅科技有限公司 Webpage running method and device, storage medium and equipment
CN114564728A (en) * 2022-04-29 2022-05-31 成都无糖信息技术有限公司 Code-free process visualization vulnerability detection method and system
US11921854B2 (en) 2021-06-29 2024-03-05 Acronis International Gmbh Malware detection quality control

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964025A (en) * 2009-07-23 2011-02-02 中联绿盟信息技术(北京)有限公司 XSS (Cross Site Scripting) detection method and device
CN103617390A (en) * 2013-11-06 2014-03-05 北京奇虎科技有限公司 Malicious webpage judgment method, device and system
CN104200166A (en) * 2014-08-05 2014-12-10 杭州安恒信息技术有限公司 Script-based website vulnerability scanning method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964025A (en) * 2009-07-23 2011-02-02 中联绿盟信息技术(北京)有限公司 XSS (Cross Site Scripting) detection method and device
CN103617390A (en) * 2013-11-06 2014-03-05 北京奇虎科技有限公司 Malicious webpage judgment method, device and system
CN104200166A (en) * 2014-08-05 2014-12-10 杭州安恒信息技术有限公司 Script-based website vulnerability scanning method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111277601A (en) * 2020-01-22 2020-06-12 奇安信科技集团股份有限公司 Website security monitoring method and system
CN111447224A (en) * 2020-03-26 2020-07-24 江苏亨通工控安全研究院有限公司 Web vulnerability scanning method and vulnerability scanner
CN111475763A (en) * 2020-04-15 2020-07-31 成都安易迅科技有限公司 Webpage running method and device, storage medium and equipment
CN111475763B (en) * 2020-04-15 2020-12-15 成都安易迅科技有限公司 Webpage running method and device, storage medium and equipment
US11921854B2 (en) 2021-06-29 2024-03-05 Acronis International Gmbh Malware detection quality control
CN114564728A (en) * 2022-04-29 2022-05-31 成都无糖信息技术有限公司 Code-free process visualization vulnerability detection method and system

Similar Documents

Publication Publication Date Title
CN104200166B (en) Script-based website vulnerability scanning method and system
CN110392024A (en) A kind of page detection method is set with scanning engine
CN101242279B (en) Automatic penetration testing system and method for WEB system
US9356955B2 (en) Methods for determining cross-site scripting and related vulnerabilities in applications
US9021593B2 (en) XSS detection method and device
CN103530564B (en) A kind of SQL injection loophole test and validation method and system
US20190196811A1 (en) Api specification generation
CN105871845A (en) Method and device for detecting Web vulnerability scanning behavior
CN106886494A (en) A kind of automatic interface testing method and its system
CN102982117B (en) Information search method and device
CN107832622B (en) Leak detection method, device, computer equipment and storage medium
CN111079043A (en) Key content positioning method
US12050652B2 (en) Service packaging method based on web page segmentation and search algorithm
US20140164296A1 (en) Chatbot system and method with entity-relevant content from entity
CN110460612A (en) Safety detecting method, equipment, storage medium and device
CN104537305B (en) Website vulnerability detection method and system
CN106446113A (en) Mobile big data analysis method and device
CN108632219A (en) A kind of website vulnerability detection method, detection service device and system
CN108985064A (en) A kind of method and device identifying malice document
CN105260469B (en) A kind of method, apparatus and equipment for handling site maps
CN106209487B (en) For detecting the method and device of the security breaches of webpage in website
CN104679747A (en) Detection device and method for website redirection
CN109672658A (en) Detection method, device, equipment and the storage medium of JSON abduction loophole
CN107896225A (en) Fishing website decision method, server and storage medium
CN106909846A (en) One kind is based on empty quasi-analytic leak detection method and its device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20191029

WW01 Invention patent application withdrawn after publication