CN110555179A - Dynamic website script evidence obtaining method, terminal equipment and storage medium - Google Patents

Dynamic website script evidence obtaining method, terminal equipment and storage medium Download PDF

Info

Publication number
CN110555179A
CN110555179A CN201910835016.7A CN201910835016A CN110555179A CN 110555179 A CN110555179 A CN 110555179A CN 201910835016 A CN201910835016 A CN 201910835016A CN 110555179 A CN110555179 A CN 110555179A
Authority
CN
China
Prior art keywords
webpage
interface
page
calling
script
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910835016.7A
Other languages
Chinese (zh)
Inventor
曾潮缤
曾清辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Xiamen Meiya Pico Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meiya Pico Information Co Ltd filed Critical Xiamen Meiya Pico Information Co Ltd
Priority to CN201910835016.7A priority Critical patent/CN110555179A/en
Publication of CN110555179A publication Critical patent/CN110555179A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • G06F16/972Access to data in other repository systems, e.g. legacy data or dynamic Web page generation

Abstract

The invention relates to a dynamic website script evidence obtaining method, terminal equipment and a storage medium, wherein the method comprises the following steps: starting a browser and connecting the development tool protocol interface address of each webpage; setting a page cookie; newly creating a blank page; starting a page notification function; starting network tracking and network event distribution functions; opening a webpage to be proved; after the webpage is loaded, calling an interface to execute a javascript script to enable the webpage to roll to the bottom, and loading all webpage resources; tracking the webpage resource loading progress through an interface, and storing the webpage after the webpage resource is completely loaded; saving all resource files of the webpage; saving the whole webpage into a picture; and judging whether a next page exists or not, if not, ending, and if so, clicking a next page button to enter the next page. The invention obtains the page screenshot by calling the interface and the script and simulating the browser, thereby achieving the method for obtaining the evidence of the target website.

Description

dynamic website script evidence obtaining method, terminal equipment and storage medium
Technical Field
the invention relates to the field of website forensics, in particular to a dynamic website script forensics method, terminal equipment and a storage medium.
background
With the rapid development of internet application technology, the internet is filled with various harmful information, including intellectual property right infringement, pornography, gambling and other related information, and how to obtain evidence of the internet information is the difficulty of computer crime evidence obtaining. The internet evidence obtaining is obviously different from the traditional computer evidence obtaining, and the traditional computer evidence obtaining mainly deducts computers and related media related to crimes and analyzes related data to obtain the process of related evidence. However, with the development of cloud computing technology, servers, media and the like of the related websites are related cloud hosts, and evidence obtaining cannot be performed in a manner of obtaining an entity machine, so that evidence is easily lost, the evidence obtaining difficulty is caused, and how to quickly obtain the evidence in an internet manner is a problem to be mainly solved.
At present, a method for obtaining evidence of a remote website mainly obtains a page, a server port and a page source code of a target website in a mode of simulating browser access, captures a corresponding page, calculates and obtains a hash value of the page to ensure the originality of the evidence, and performs computer operation video recording on the whole evidence obtaining process to ensure the legal compliance of the evidence.
however, the forensics method is more suitable for static pages or some dynamically loaded pages, wherein the method for obtaining forensics of screenshots of a large number of types of pages cannot be carried out, for example, the URLs of some website pages are the same, but the jump of the pages is controlled by a script mode, so that when the screenshot of the page is obtained through the URL, only the first page can be obtained, other hidden pages cannot be obtained, and the problem needs to be solved through related technical means.
Disclosure of Invention
In order to solve the above problems, the present invention provides a dynamic website script forensics method, a terminal device and a storage medium.
The specific scheme is as follows:
A dynamic website script forensics method comprises the following steps:
S1: starting a browser and acquiring a development tool protocol interface address of each webpage in the browser;
s2: connecting the interface address, and establishing a message receiving and sending channel between the application program and the browser;
S3: calling an interface to set page cookies to realize the website login effect;
S4: newly creating a blank page;
S5: calling an interface to start a page notification function;
s6: calling an interface to start a network tracking and network event distribution function;
S7: calling an interface to open a webpage to be forensics;
s8: after the webpage is loaded, calling an interface to execute a javascript script to enable the webpage to roll to the bottom, and loading all webpage resources;
s9: tracking the webpage resource loading progress through an interface, and storing the webpage after the webpage resource is completely loaded;
s10: calling an interface to store all resource files of the webpage;
S11: calling an interface to store the whole webpage into a picture;
S12: calling the interface to execute javascript script detection to judge whether a next page exists, if not, ending, and if so, entering S13;
S13: the interface is called to execute javascript to click the next page button to enter the next page, returning to S8.
Further, the browser is a chrome browser, is started through a chrome, exe-remote-debug-port, and acquires the development tool protocol interface address of each webpage through http:// localhost: 9000.
Further, all resource files of the web page include page files, pictures, JavaScript script files, and fonts.
further, in step S12, it is detected whether there is a javascript script of the next page as follows:
Further, the javascript script for the next page entered in step S13 is as follows:
a dynamic website script forensics terminal device comprises a processor, a memory and a computer program which is stored in the memory and can run on the processor, wherein the processor executes the computer program to realize the steps of the method of the embodiment of the invention.
a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to an embodiment of the invention as described above.
According to the technical scheme, the real link of the dynamic website is obtained by calling each interface and the execution script in the development tool protocol so as to obtain the real page, and then the page screenshot is obtained in a browser simulation mode so as to achieve the purpose of obtaining evidence of the target website.
drawings
fig. 1 is a flowchart illustrating a first embodiment of the present invention.
Detailed Description
to further illustrate the various embodiments, the invention provides the accompanying drawings. The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the embodiments. Those skilled in the art will appreciate still other possible embodiments and advantages of the present invention with reference to these figures.
The invention will now be further described with reference to the accompanying drawings and detailed description.
The first embodiment is as follows:
The embodiment of the invention provides a dynamic website script evidence obtaining method, which is described by taking a Chrome browser as an example and also comprises a browser of a Chrome browser kernel, and the method can be applied to other browsers, and the browsers which support the calling operation of a development tool protocol interface of a webpage can be realized by adopting similar methods, such as a 360 browser, a QQ browser and the like.
as shown in fig. 1, the method comprises the steps of:
Step 1, a Chrome browser provides a remote debugging interface parameter (-remote-debug-port) and a development tool protocol support, a development tool protocol interface address of each webpage can be obtained through http:// localhost after the Chrome browser is started by using the Chrome, exe-remote-debug-port 9000, sending and receiving of Chrome messages can be realized after the protocol interface addresses are connected by using websockets, calling of an interface is realized by sending a message in a JSON format to the Chrome browser, wherein a metal field designates an interface name to be called, a params field transmits a parameter for calling the interface, and JSON contents are as follows:
{"method":"Network.setCookies","params":{"cookies":[]}}
And 2, calling a network.
Step 3, calling http:// localhost:9000/json/new to newly create a blank page.
and 4, calling a Page enable interface to start a page notification function.
and 5, calling a network.
And 6, calling a page.
And 7, after the loading of the main frame of the webpage is finished, executing a javascript script through a runtime.
The JS script content of the scrolling page is as follows: scrollto (0,1024).
and 8, tracking the loading progress of the webpage resources through a network.
And 9, calling a network. getresponsebody interface to store all resource files of the webpage, including page files, pictures, JavaScript script files, fonts and the like.
and step 10, calling a page.
And 11, calling a Runtime. evaluation interface to execute a javascript script to detect whether a next page exists, if not, ending, and if so, entering the step 12.
In this embodiment, whether the javascript script of the next page exists is detected as follows:
And step 12, calling a runtime and update interface to execute a javascript script to click a next page button to turn pages and jumping to the step 7 when a next page is detected.
in this embodiment, the javascript script for the next page is as follows:
The embodiment of the invention discloses a method for obtaining evidence of a target website by obtaining a real link of a dynamic website by calling each interface and an execution script in a development tool protocol to obtain a real page and then obtaining a page screenshot in a browser simulation mode.
Example two:
the invention also provides dynamic website script forensics terminal equipment which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor executes the computer program to realize the steps of the method embodiment of the first embodiment of the invention.
further, as an executable scheme, the dynamic website script forensics terminal device may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The dynamic website script forensics terminal device can include, but is not limited to, a processor and a memory. It is understood by those skilled in the art that the above-mentioned composition structure of the dynamic website script forensics terminal device is only an example of the dynamic website script forensics terminal device, and does not constitute a limitation on the dynamic website script forensics terminal device, and may include more or less components than the above, or combine some components, or different components, for example, the dynamic website script forensics terminal device may further include an input/output device, a network access device, a bus, and the like, which is not limited in this embodiment of the present invention.
Further, as an executable solution, the processor may be a Central Processing Unit (CPU), other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, a discrete hardware component, and the like. The general processor may be a microprocessor or the processor may be any conventional processor, and the processor is a control center of the dynamic website script forensics terminal device, and various interfaces and lines are used to connect various parts of the entire dynamic website script forensics terminal device.
the memory can be used for storing the computer program and/or the module, and the processor realizes various functions of the dynamic website script forensics terminal equipment by running or executing the computer program and/or the module stored in the memory and calling data stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system and an application program required by at least one function; the storage data area may store data created according to the use of the mobile phone, and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The invention also provides a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the above-mentioned method of an embodiment of the invention.
The module/unit integrated by the dynamic website script evidence-obtaining terminal device can be stored in a computer readable storage medium if the module/unit is realized in the form of a software functional unit and sold or used as an independent product. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-only Memory (ROM ), Random Access Memory (RAM), software distribution medium, and the like.
while the invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (7)

1. A dynamic website script forensics method is characterized by comprising the following steps:
S1: starting a browser and acquiring a development tool protocol interface address of each webpage in the browser;
S2: connecting the interface address, and establishing a message receiving and sending channel between the application program and the browser;
S3: calling an interface to set page cookies to realize the website login effect;
S4: newly creating a blank page;
s5: calling an interface to start a page notification function;
s6: calling an interface to start a network tracking and network event distribution function;
S7: calling an interface to open a webpage to be forensics;
S8: after the webpage is loaded, calling an interface to execute a javascript script to enable the webpage to roll to the bottom, and loading all webpage resources;
S9: tracking the webpage resource loading progress through an interface, and storing the webpage after the webpage resource is completely loaded;
s10: calling an interface to store all resource files of the webpage;
s11: calling an interface to store the whole webpage into a picture;
s12: calling the interface to execute javascript script detection to judge whether a next page exists, if not, ending, and if so, entering S13;
S13: the interface is called to execute javascript to click the next page button to enter the next page, returning to S8.
2. The dynamic website scripting forensics method of claim 1, wherein: the browser is a chrome browser, is started through a chrome, exe-remote-debug-port and 9000, and acquires the development tool protocol interface address of each webpage through http:// localhost:// 9000.
3. The dynamic website scripting forensics method of claim 1, wherein: all resource files of the web page include page files, pictures, JavaScript files and fonts.
4. The dynamic website scripting forensics method of claim 1, wherein: in step S12, it is detected whether there is a javascript script of the next page as follows:
5. the dynamic website scripting forensics method of claim 1, wherein: the javascript script for the next page entered in step S13 is as follows:
6. A dynamic website script evidence obtaining terminal device is characterized in that: comprising a processor, a memory and a computer program stored in the memory and running on the processor, the processor implementing the steps of the method according to any of claims 1 to 5 when executing the computer program.
7. a computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN201910835016.7A 2019-09-05 2019-09-05 Dynamic website script evidence obtaining method, terminal equipment and storage medium Pending CN110555179A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910835016.7A CN110555179A (en) 2019-09-05 2019-09-05 Dynamic website script evidence obtaining method, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910835016.7A CN110555179A (en) 2019-09-05 2019-09-05 Dynamic website script evidence obtaining method, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110555179A true CN110555179A (en) 2019-12-10

Family

ID=68739044

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910835016.7A Pending CN110555179A (en) 2019-09-05 2019-09-05 Dynamic website script evidence obtaining method, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110555179A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111881384A (en) * 2020-07-02 2020-11-03 北京华赛在线科技有限公司 Illegal external connection evidence obtaining method, system and storage medium
CN112241502A (en) * 2020-10-16 2021-01-19 北京字节跳动网络技术有限公司 Page loading detection method and device
CN113805984A (en) * 2021-08-05 2021-12-17 厦门市美亚柏科信息股份有限公司 Dynamic webpage screenshot method, terminal equipment and storage medium
CN114257408A (en) * 2021-11-18 2022-03-29 珠海金智维信息科技有限公司 Network space data acquisition method, system and medium
CN115982499A (en) * 2022-12-27 2023-04-18 中国电子产业工程有限公司 Page storage method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473245A (en) * 2012-06-08 2013-12-25 金峰顺泰知识产权有限公司 Webpage evidence saving method and system
US20140283084A1 (en) * 2013-03-12 2014-09-18 Wins Technet Co., Ltd Automatic malignant code collecting system
CN104199962A (en) * 2014-09-19 2014-12-10 合肥工业大学 Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model
KR101485128B1 (en) * 2013-09-27 2015-01-28 김병호 Method and system for collecting evidence of unlawfulness literary works
CN107943997A (en) * 2017-12-05 2018-04-20 厦门市美亚柏科信息股份有限公司 A kind of remote website evidence collecting method, terminal device and storage medium based on Google's browser

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473245A (en) * 2012-06-08 2013-12-25 金峰顺泰知识产权有限公司 Webpage evidence saving method and system
US20140283084A1 (en) * 2013-03-12 2014-09-18 Wins Technet Co., Ltd Automatic malignant code collecting system
KR101485128B1 (en) * 2013-09-27 2015-01-28 김병호 Method and system for collecting evidence of unlawfulness literary works
CN104199962A (en) * 2014-09-19 2014-12-10 合肥工业大学 Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model
CN107943997A (en) * 2017-12-05 2018-04-20 厦门市美亚柏科信息股份有限公司 A kind of remote website evidence collecting method, terminal device and storage medium based on Google's browser

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111881384A (en) * 2020-07-02 2020-11-03 北京华赛在线科技有限公司 Illegal external connection evidence obtaining method, system and storage medium
CN111881384B (en) * 2020-07-02 2023-05-26 北京华赛在线科技有限公司 Evidence obtaining method, system and storage medium for illegal external connection
CN112241502A (en) * 2020-10-16 2021-01-19 北京字节跳动网络技术有限公司 Page loading detection method and device
CN113805984A (en) * 2021-08-05 2021-12-17 厦门市美亚柏科信息股份有限公司 Dynamic webpage screenshot method, terminal equipment and storage medium
CN113805984B (en) * 2021-08-05 2024-02-06 厦门市美亚柏科信息股份有限公司 Dynamic webpage screenshot method, terminal equipment and storage medium
CN114257408A (en) * 2021-11-18 2022-03-29 珠海金智维信息科技有限公司 Network space data acquisition method, system and medium
CN115982499A (en) * 2022-12-27 2023-04-18 中国电子产业工程有限公司 Page storage method, device, equipment and storage medium
CN115982499B (en) * 2022-12-27 2024-04-05 中国电子产业工程有限公司 Page storage method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110555179A (en) Dynamic website script evidence obtaining method, terminal equipment and storage medium
JP6214547B2 (en) Measuring the rendering time of a web page
CN108880921B (en) Webpage monitoring method and device, storage medium and server
WO2016173200A1 (en) Malicious website detection method and system
CN107943997B (en) Remote website evidence obtaining method based on Google browser, terminal device and storage medium
JP5982586B2 (en) Resource calls for hybrid applications
US10212179B2 (en) Method and system for checking security of URL for mobile terminal
JP6110950B2 (en) Web page with on-board hardware functions
US9471701B2 (en) Methods and systems for secure in-network insertion of web content and web services
CN107291759B (en) Method and device for processing browser page resources
US20170032494A1 (en) Methods for displaying a webpage fragment on a desktop and systems for taking a snapshot of webpage fragment for displaying on a desktop
CN112637361B (en) Page proxy method, device, electronic equipment and storage medium
CN107807934B (en) Page display method and device and computing equipment
EP3528474B1 (en) Webpage advertisement anti-shielding methods and content distribution network
EP3306510B1 (en) Threat detection method and apparatus, and network system
CN111431767A (en) Multi-browser resource synchronization method and device, computer equipment and storage medium
CN110806913A (en) Webpage screenshot method, device and equipment
US20140157104A1 (en) Dynamic sharing and updating of a web page
JP6505849B2 (en) Generation of element identifier
CN111046308A (en) Page loading method and device
CN112672187B (en) Page generation method and device, computer equipment and readable storage medium
CN111444448B (en) Data processing method, server and system
CN110457632B (en) Webpage loading processing method and device
CN112800311A (en) Browser page data acquisition method, terminal device and storage medium
CN112307386A (en) Information monitoring method, system, electronic device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191210