CN110392024A - A kind of page detection method is set with scanning engine - Google Patents
A kind of page detection method is set with scanning engine Download PDFInfo
- Publication number
- CN110392024A CN110392024A CN201810359247.0A CN201810359247A CN110392024A CN 110392024 A CN110392024 A CN 110392024A CN 201810359247 A CN201810359247 A CN 201810359247A CN 110392024 A CN110392024 A CN 110392024A
- Authority
- CN
- China
- Prior art keywords
- module
- scanning engine
- script
- hole detection
- detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention relates to a kind of page detection methods, determine the receivable parameter-value of webpage to set;And be the parameter-value to each parameter-value pair in set: construction inserts the parameter-value pair of particular script in value, the website URL to be scanned is set, start scanning engine module, the URL detected to needs is constructed and is sent HTTP request, and receive http response, it is stored in scanning engine module, executes corresponding Hole Detection script module;Hole Detection script module passes through API from scanning engine module, the data of the HTTP request and response that are saved in obtaining step C, the website detected needed for judgement whether there is loophole, the source code of the data of the HTTP request and response that are saved in analytical procedure C, check whether that there are malicious acts, judge whether the webpage is malicious web pages according to the scanning result of each scanning engine, Hole Detection strategy is realized with scripting language and can be detected whether as malicious websites.
Description
Technical field
The present invention relates to webpage visit application fields more particularly to a kind of page detection method to set with scanning engine.
Background technique
With the development of internet, various network applications emerge one after another, and while realizing various functions, have also been introduced
Various security breaches, provide convenience to attacker.For the continuous growth of web portal security demand, there are many website vulnerabilities
Scanner, URL " creeping " entire website that scanner would generally be provided according to user, page download be got off, then by webpage
Content detected, analyze with check in webpage whether leaky presence.
But nearly all scanner all suffers from such problems: (1) loophole is varied, for the detection of different loopholes
Method is again different, how to rationally design scanner, various loopholes can be supported to greatest extent? (2) internet is one
The industry of a high speed development all might have new network station leakage at any time and generate, and how quickly extension sweeps
Device is retouched to support new Hole Detection scheme?
Existing scanner is used to describe the inspection policies of each loophole using static configuration file mostly.But it is common
Configuration file often lacks flexibility, can not quickly extend, and is also not easy to security study personnel use.
Summary of the invention
The purpose of the present invention is to provide a kind of to realize Hole Detection strategy with scripting language and can detect whether to dislike
A kind of page detection method of meaning website is set with scanning engine.
To achieve the above object, the invention provides the following technical scheme: a kind of page detection method, specifically includes following steps
It is rapid:
Step A: determine the receivable parameter-value of webpage to set;It and is the parameter-value to each ginseng in set
Number-value pair: construction inserts the parameter-value pair of particular script in value;
The website URL to be scanned is arranged in step B, selects the website security breaches type to be detected;
Step C: starting scanning engine module, the URL detected to needs construct and send HTTP request, and receive HTTP and ring
It answers;
Step D: by all data of HTTP request and response in step C, it is stored in scanning engine module;
Step E: the security breaches type selected according to user executes corresponding Hole Detection script module respectively;Loophole
Data of the detection script module by the API HTTP request and response saved from scanning engine module, obtaining step C, loophole
Detecting the website detected needed for script module can judge according to the data of acquisition whether there is loophole.
Step F: the source code of the data of the HTTP request and response that save in analytical procedure C parses the mark of the webpage
Label;
Step G: each label parsed is input in corresponding different scanning engine according to different type and is swept
It retouches, checks whether that there are malicious acts;
Step H: judge whether the webpage is malicious web pages according to the scanning result of each scanning engine.
Further, in step E, Hole Detection script module can also be constructed by API, send new HTTP request, and
Further Hole Detection is carried out according to obtained response.
Further, the website vulnerability scan method based on script can configure which loophole inspection is each scan task enable
Script is surveyed, user at any time, can choose and detect all loopholes, can also only select the loophole of a part, only use
The loophole of family selection, corresponding script can be just performed.
A kind of scanning engine of page detection method is set, including scanning engine module and Hole Detection script module, described
Scanning engine module is able to achieve following function:
(1) HTTP request is constructed and sent, http response is received;
(2) runtime environment of scripting language is provided;
(3) calling interface is provided to shell script, the function of allowing scripting language that engine is used to provide;
The function (1) is realized by the HTTP send and receive packets module of scanning engine inside modules;Scanning engine inside modules
Equipped with HTTP send and receive packets module, is sent for simulation browser, receives HTTP request;
The function (2) is realized by runtime environment module;Scanning engine inside modules are equipped with runtime environment module,
It is the module that script program operation is relied on;
In the function (3), scanning engine module provides interface to Hole Detection script, and physical interface includes:
Interface a: obtaining and need the target webpage URL that scans, the mode for obtaining target webpage URL include manually enter, from
Existing url list or any database for storing URL are imported, are obtained by network packet capturing, are imported from website crawler;
Interface b: obtaining the corresponding HTMLDom information of content of pages, and HTMLDom information includes link, button, list, table
Single element, text, script;
Interface c: the related data of the HTTP request of scanning engine module, including Cookie, session, HTTP, one are obtained
Time used in secondary request;
Interface d: the request of construction, transmission HTTP receives corresponding http response to scanned website, can be arranged
The each section content of HTTP request, including Cookie, HTTP head;
Interface e: the vulnerability information that will be seen that is reported to scanning engine module, and feeds back display;The Hole Detection script
Module is interacted by the interface realization in scanning engine module with scanning engine module, and each Hole Detection script module is for examining
The loophole of a classification is surveyed, and is independently executed between different Hole Detection script modules, testing result is not generated and influenced each other;
Hole Detection script module carries out Hole Detection to the page of the website of required detection respectively, if detection springs a leak, loophole inspection
It surveys script module and the vulnerability information of acquisition is returned into scanning engine module;Vulnerability information includes: the URL to start a leak, loophole
Title, the detailed description of loophole, loophole reparation suggestion;When Hole Detection script module carries out Hole Detection, by near
A kind of few leak detection method carries out page Hole Detection with combined in any order, and specific leak detection method includes:
Method a: according to be detected URL request answer code, HTTP, the text of session and Cookie, response contents it is long
Degree, response time length, judge whether the feature for meeting loophole;
Method b: it in the page response content for being detected URL, according to the needs of vulnerability detection logic, carries out text and looks into
It looks for, the mode of asterisk wildcard or regular expression matching, and judges whether according to matching result the feature for meeting loophole;
Method c: it in the page response content for being detected URL, according to the needs of vulnerability detection logic, extracts in specific
Hold, judges whether the feature for meeting loophole;Specific content includes link, list, Form Element, button, annotation, text, mark
Label, tag attributes, script, CSS definition;
Method d: providing customized dictionary file, successively extracts the content in dictionary file, is used for Hole Detection, content
Including each word, word, line of text;
Method e: during Hole Detection script module carries out Hole Detection, at least one new HTTP request is constructed
Packet, according to the needs of vulnerability detection logic, together by new HTTP request packet and the request packet of parent page, for answer code,
Page length, HTTP, the otherness of content of pages etc. compare and for content extraction and matching;Hole Detection script
According to otherness compare or content matching as a result, judging whether there is loophole.
Further, the Hole Detection script module allows website of the user according to required detection, the leakage of custom writing
Script is detected in hole, for detecting the specific safety problem of user.
Further, the Hole Detection script can be realized using various scripting languages, and operated in the scanning engine and mentioned
In the Hole Detection script runtime environment module of confession.
Further, the Hole Detection script module is stored the vulnerability information of acquisition by scanning engine module
And output.
Compared with prior art, the beneficial effects of the present invention are:
1. a kind of page detection method provided by the present invention is set with scanning engine, scans the detection logical AND of loophole and draw
The degree of coupling both holding up separation, reduce, the logic of Hole Detection realized by Hole Detection script, scanning engine realize it is general,
Not particular to the basic function of certain a kind of loophole.Such advantage is that entire website vulnerability scanning system is allowed to be easy to extend,
Can strategy detection script very easily be write for newfound loophole.
2. analyzing the source code of webpage, the label of the webpage is parsed, by each label parsed according to different type
It is input in corresponding different scanning engine and is scanned, check whether there are malicious act, according to the scanning of each scanning engine
As a result judge the webpage whether be malicious web pages technical solution, due to parsing the label of webpage, by different types of mark
It signs and is scanned respectively in corresponding different scanning engine of input, improve the efficiency of webpage detection, and due to not
Same scanning engine is all targetedly scanned corresponding label, improves the accuracy of judgement.
Detailed description of the invention
Fig. 1 is the general frame flowage structure schematic diagram that a kind of page detection method and scanning engine of the present invention are set.
Fig. 2 is the structural schematic diagram that a kind of page detection method and scanning engine of the present invention are set.
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples.
Embodiment:
As shown in Figure 1, described in the embodiment of the present invention to achieve the above object, the invention provides the following technical scheme: one
Kind page detection method, specifically include the following steps:
Step A: determine the receivable parameter-value of webpage to set;It and is the parameter-value to each ginseng in set
Number-value pair: construction inserts the parameter-value pair of particular script in value;
The website URL to be scanned is arranged in step B, selects the website security breaches type to be detected;
Step C: starting scanning engine module, the URL detected to needs construct and send HTTP request, and receive HTTP and ring
It answers;
Step D: by all data of HTTP request and response in step C, it is stored in scanning engine module;
Step E: the security breaches type selected according to user executes corresponding Hole Detection script module respectively;Loophole
Data of the detection script module by the API HTTP request and response saved from scanning engine module, obtaining step C, loophole
Detecting the website detected needed for script module can judge according to the data of acquisition whether there is loophole.
Step F: the source code of the data of the HTTP request and response that save in analytical procedure C parses the mark of the webpage
Label;
Step G: each label parsed is input in corresponding different scanning engine according to different type and is swept
It retouches, checks whether that there are malicious acts;
Step H: judge whether the webpage is malicious web pages according to the scanning result of each scanning engine.
Further, in step E, Hole Detection script module can also be constructed by API, send new HTTP request, and
Further Hole Detection is carried out according to obtained response.
Further, the website vulnerability scan method based on script can configure which loophole inspection is each scan task enable
Script is surveyed, user at any time, can choose and detect all loopholes, can also only select the loophole of a part, only use
The loophole of family selection, corresponding script can be just performed.
As shown in Fig. 2, a kind of scanning engine of page detection method is set, including scanning engine module and Hole Detection script
Module, the scanning engine module are able to achieve following function:
(1) HTTP request is constructed and sent, http response is received;
(2) runtime environment of scripting language is provided;
(3) calling interface is provided to shell script, the function of allowing scripting language that engine is used to provide;
The function (1) is realized by the HTTP send and receive packets module of scanning engine inside modules;Scanning engine inside modules
Equipped with HTTP send and receive packets module, is sent for simulation browser, receives HTTP request;
The function (2) is realized by runtime environment module;Scanning engine inside modules are equipped with runtime environment module,
It is the module that script program operation is relied on;
In the function (3), scanning engine module provides interface to Hole Detection script, and physical interface includes:
Interface a: obtaining and need the target webpage URL that scans, the mode for obtaining target webpage URL include manually enter, from
Existing url list or any database for storing URL are imported, are obtained by network packet capturing, are imported from website crawler;
Interface b: obtaining the corresponding HTMLDom information of content of pages, and HTMLDom information includes link, button, list, table
Single element, text, script;
Interface c: the related data of the HTTP request of scanning engine module, including Cookie, session, HTTP, one are obtained
Time used in secondary request;
Interface d: the request of construction, transmission HTTP receives corresponding http response to scanned website, can be arranged
The each section content of HTTP request, including Cookie, HTTP head;
Interface e: the vulnerability information that will be seen that is reported to scanning engine module, and feeds back display;The Hole Detection script
Module is interacted by the interface realization in scanning engine module with scanning engine module, and each Hole Detection script module is for examining
The loophole of a classification is surveyed, and is independently executed between different Hole Detection script modules, testing result is not generated and influenced each other;
Hole Detection script module carries out Hole Detection to the page of the website of required detection respectively, if detection springs a leak, loophole inspection
It surveys script module and the vulnerability information of acquisition is returned into scanning engine module;Vulnerability information includes: the URL to start a leak, loophole
Title, the detailed description of loophole, loophole reparation suggestion;When Hole Detection script module carries out Hole Detection, by near
A kind of few leak detection method carries out page Hole Detection with combined in any order, and specific leak detection method includes:
Method a: according to be detected URL request answer code, HTTP, the text of session and Cookie, response contents it is long
Degree, response time length, judge whether the feature for meeting loophole;
Method b: it in the page response content for being detected URL, according to the needs of vulnerability detection logic, carries out text and looks into
It looks for, the mode of asterisk wildcard or regular expression matching, and judges whether according to matching result the feature for meeting loophole;
Method c: it in the page response content for being detected URL, according to the needs of vulnerability detection logic, extracts in specific
Hold, judges whether the feature for meeting loophole;Specific content includes link, list, Form Element, button, annotation, text, mark
Label, tag attributes, script, CSS definition;
Method d: providing customized dictionary file, successively extracts the content in dictionary file, is used for Hole Detection, content
Including each word, word, line of text;
Method e: during Hole Detection script module carries out Hole Detection, at least one new HTTP request is constructed
Packet, according to the needs of vulnerability detection logic, together by new HTTP request packet and the request packet of parent page, for answer code,
Page length, HTTP, the otherness of content of pages etc. compare and for content extraction and matching;Hole Detection script
According to otherness compare or content matching as a result, judging whether there is loophole.
The Hole Detection script module allows website of the user according to required detection, the Hole Detection foot of custom writing
This, for detecting the specific safety problem of user, the Hole Detection script can be realized using various scripting languages, and be operated in
In the Hole Detection script runtime environment module that the scanning engine provides, the Hole Detection script module is by the leakage of acquisition
Hole information is stored and is exported by scanning engine module.
A kind of page detection method provided by the present embodiment is set with scanning engine, is scanned the detection logical AND of loophole and is drawn
The degree of coupling both holding up separation, reduce, the logic of Hole Detection realized by Hole Detection script, scanning engine realize it is general,
Not particular to the basic function of certain a kind of loophole.Such advantage is that entire website vulnerability scanning system is allowed to be easy to extend,
Strategy detection script very easily can be write for newfound loophole, analyze the source code of webpage, parse the webpage
Label, each label parsed is input in corresponding different scanning engine according to different type and is scanned, is checked
With the presence or absence of malicious act, according to the scanning result of each scanning engine judge the webpage whether be malicious web pages technical side
Case, due to parsing the label of webpage, in corresponding different scanning engine that different types of label is inputted respectively into
Row scanning, improve webpage detection efficiency, and due to different scanning engines all targetedly to corresponding label into
Row scanning, improves the accuracy of judgement.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the technical principles of the invention, several improvements and modifications can also be made, these improvements and modifications
Also it should be regarded as protection scope of the present invention.
Claims (7)
1. a kind of page detection method, which is characterized in that specifically include the following steps:
Step A: determine the receivable parameter-value of webpage to set;It and is the parameter-value to each parameter-in set
Value pair: construction inserts the parameter-value pair of particular script in value;
Step B: the setting website URL to be scanned selects the website security breaches type to be detected;
Step C: starting scanning engine module, the URL detected to needs constructs and sends HTTP request, and receives http response;
Step D: by all data of HTTP request and response in step C, it is stored in scanning engine module;
Step E: the security breaches type selected according to user executes corresponding Hole Detection script module respectively;Hole Detection
Data of the script module by the API HTTP request and response saved from scanning engine module, obtaining step C, Hole Detection
The website that script module detects needed for capable of being judged according to the data of acquisition whether there is loophole.
Step F: the source code of the data of the HTTP request and response that save in analytical procedure C parses the label of the webpage;
Step G: each label parsed is input in corresponding different scanning engine according to different type and is scanned, is looked into
It sees with the presence or absence of malicious act;
Step H: judge whether the webpage is malicious web pages according to the scanning result of each scanning engine.
2. a kind of page detection method according to claim 1, which is characterized in that in step E, Hole Detection script module
It can also be constructed by API, send new HTTP request, and further Hole Detection is carried out according to obtained response.
3. a kind of page detection method according to claim 1, which is characterized in that the website vulnerability based on script is swept
The method of retouching can configure which Hole Detection script is each scan task enable, and user at any time, it is all to can choose detection
Loophole, can also only select the loophole of a part, the only loophole of user's selection, corresponding script can just be performed.
4. a kind of scanning engine of page detection method according to claim 1 is set, including scanning engine module and leakage
Detect script module in hole, which is characterized in that the scanning engine module is able to achieve following function:
(1) HTTP request is constructed and sent, http response is received;
(2) runtime environment of scripting language is provided;
(3) calling interface is provided to shell script, the function of allowing scripting language that engine is used to provide;
The function (1) is realized by the HTTP send and receive packets module of scanning engine inside modules;Scanning engine inside modules are equipped with
HTTP send and receive packets module sends for simulation browser, receives HTTP request;
The function (2) is realized by runtime environment module;Scanning engine inside modules are equipped with runtime environment module, are feet
This program runs relied on module;
In the function (3), scanning engine module provides interface to Hole Detection script, and physical interface includes:
Interface a: obtaining and need the target webpage URL that scans, and the mode for obtaining target webpage URL includes manually entering, from existing
Url list or it is any store URL database import, by network packet capturing obtain, from website crawler import;
Interface b: obtaining the corresponding HTMLDom information of content of pages, and HTMLDom information includes link, button, list, table unit
Element, text, script;
Interface c: obtain scanning engine module HTTP request related data, including Cookie, session, HTTP, once ask
Ask the time used;
Interface d: the request of construction, transmission HTTP receives corresponding http response to scanned website, and HTTP can be arranged and ask
The each section content asked, including Cookie, HTTP head;
Interface e: the vulnerability information that will be seen that is reported to scanning engine module, and feeds back display;The Hole Detection script module
It is realized by the interface in scanning engine module and is interacted with scanning engine module, each Hole Detection script module is for detecting one
The loophole of a classification, and independently executed between different Hole Detection script modules, testing result is not generated and is influenced each other;Loophole
It detects script module and Hole Detection is carried out to the page of the website of required detection respectively, if detection springs a leak, Hole Detection foot
The vulnerability information of acquisition is returned to scanning engine module by this module;Vulnerability information includes: the URL to start a leak, the name of loophole
The reparation suggestion of title, the detailed description of loophole, loophole;When Hole Detection script module carries out Hole Detection, by will at least one
Kind of leak detection method carries out page Hole Detection with combined in any order, and specific leak detection method includes:
Method a: the request answer code of the detected URL of foundation, HTTP, session and Cookie, the text size of response contents, sound
Length of time is answered, judges whether the feature for meeting loophole;
Method b: it in the page response content for being detected URL, according to the needs of vulnerability detection logic, carries out String searching, lead to
Mode with symbol or regular expression matching, and judge whether according to matching result the feature for meeting loophole;
Method c: in the page response content for being detected URL, according to the needs of vulnerability detection logic, extracting specific content,
Judge whether the feature for meeting loophole;Specific content include link, list, Form Element, button, annotation, text, label,
Tag attributes, script, CSS definition;
Method d: providing customized dictionary file, successively extracts the content in dictionary file, is used for Hole Detection, content includes
Each word, word, line of text;
Method e: during Hole Detection script module carries out Hole Detection, at least one new HTTP request packet, root are constructed
It is together by new HTTP request packet and the request packet of parent page, long for answer code, the page according to the needs of vulnerability detection logic
Degree, HTTP, the otherness comparison of content of pages etc. and extraction and matching for content;Hole Detection script is according to difference
The opposite sex compare or content matching as a result, judging whether there is loophole.
5. a kind of scanning engine of page detection method according to claim 4 is set, which is characterized in that the Hole Detection
Script module allows website of the user according to required detection, and the Hole Detection script of custom writing is specific for detecting user
Safety problem.
6. a kind of scanning engine of page detection method according to claim 4 is set, which is characterized in that the Hole Detection
Script can be realized using various scripting languages, and operate in the Hole Detection script runtime environment mould that the scanning engine provides
In block.
7. a kind of scanning engine of page detection method according to claim 4 is set, which is characterized in that the Hole Detection
Script module is stored and is exported by the vulnerability information of acquisition, by scanning engine module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810359247.0A CN110392024A (en) | 2018-04-20 | 2018-04-20 | A kind of page detection method is set with scanning engine |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810359247.0A CN110392024A (en) | 2018-04-20 | 2018-04-20 | A kind of page detection method is set with scanning engine |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110392024A true CN110392024A (en) | 2019-10-29 |
Family
ID=68283675
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810359247.0A Withdrawn CN110392024A (en) | 2018-04-20 | 2018-04-20 | A kind of page detection method is set with scanning engine |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110392024A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111277601A (en) * | 2020-01-22 | 2020-06-12 | 奇安信科技集团股份有限公司 | Website security monitoring method and system |
CN111447224A (en) * | 2020-03-26 | 2020-07-24 | 江苏亨通工控安全研究院有限公司 | Web vulnerability scanning method and vulnerability scanner |
CN111475763A (en) * | 2020-04-15 | 2020-07-31 | 成都安易迅科技有限公司 | Webpage running method and device, storage medium and equipment |
CN114564728A (en) * | 2022-04-29 | 2022-05-31 | 成都无糖信息技术有限公司 | Code-free process visualization vulnerability detection method and system |
US11921854B2 (en) | 2021-06-29 | 2024-03-05 | Acronis International Gmbh | Malware detection quality control |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101964025A (en) * | 2009-07-23 | 2011-02-02 | 中联绿盟信息技术(北京)有限公司 | XSS (Cross Site Scripting) detection method and device |
CN103617390A (en) * | 2013-11-06 | 2014-03-05 | 北京奇虎科技有限公司 | Malicious webpage judgment method, device and system |
CN104200166A (en) * | 2014-08-05 | 2014-12-10 | 杭州安恒信息技术有限公司 | Script-based website vulnerability scanning method and system |
-
2018
- 2018-04-20 CN CN201810359247.0A patent/CN110392024A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101964025A (en) * | 2009-07-23 | 2011-02-02 | 中联绿盟信息技术(北京)有限公司 | XSS (Cross Site Scripting) detection method and device |
CN103617390A (en) * | 2013-11-06 | 2014-03-05 | 北京奇虎科技有限公司 | Malicious webpage judgment method, device and system |
CN104200166A (en) * | 2014-08-05 | 2014-12-10 | 杭州安恒信息技术有限公司 | Script-based website vulnerability scanning method and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111277601A (en) * | 2020-01-22 | 2020-06-12 | 奇安信科技集团股份有限公司 | Website security monitoring method and system |
CN111447224A (en) * | 2020-03-26 | 2020-07-24 | 江苏亨通工控安全研究院有限公司 | Web vulnerability scanning method and vulnerability scanner |
CN111475763A (en) * | 2020-04-15 | 2020-07-31 | 成都安易迅科技有限公司 | Webpage running method and device, storage medium and equipment |
CN111475763B (en) * | 2020-04-15 | 2020-12-15 | 成都安易迅科技有限公司 | Webpage running method and device, storage medium and equipment |
US11921854B2 (en) | 2021-06-29 | 2024-03-05 | Acronis International Gmbh | Malware detection quality control |
CN114564728A (en) * | 2022-04-29 | 2022-05-31 | 成都无糖信息技术有限公司 | Code-free process visualization vulnerability detection method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104200166B (en) | Script-based website vulnerability scanning method and system | |
CN110392024A (en) | A kind of page detection method is set with scanning engine | |
CN101242279B (en) | Automatic penetration testing system and method for WEB system | |
US9021593B2 (en) | XSS detection method and device | |
US9356955B2 (en) | Methods for determining cross-site scripting and related vulnerabilities in applications | |
US20150295942A1 (en) | Method and server for performing cloud detection for malicious information | |
US20190196811A1 (en) | Api specification generation | |
CN105871845A (en) | Method and device for detecting Web vulnerability scanning behavior | |
CN106886494A (en) | A kind of automatic interface testing method and its system | |
CN107832622B (en) | Leak detection method, device, computer equipment and storage medium | |
CN111079043A (en) | Key content positioning method | |
US12050652B2 (en) | Service packaging method based on web page segmentation and search algorithm | |
CN104881607A (en) | XSS vulnerability detection method based on simulating browser behavior | |
CN108985064A (en) | A kind of method and device identifying malice document | |
CN109672658B (en) | JSON hijacking vulnerability detection method, device, equipment and storage medium | |
CN104537305B (en) | Website vulnerability detection method and system | |
CN108632219A (en) | A kind of website vulnerability detection method, detection service device and system | |
CN105260469B (en) | A kind of method, apparatus and equipment for handling site maps | |
CN106209487B (en) | For detecting the method and device of the security breaches of webpage in website | |
CN106909846A (en) | One kind is based on empty quasi-analytic leak detection method and its device | |
CN107896225A (en) | Fishing website decision method, server and storage medium | |
KR20190058141A (en) | Method for generating data extracted from document and apparatus thereof | |
CN105306462B (en) | Web page interlinkage detection method and device | |
CN104778232B (en) | Searching result optimizing method and device based on long query | |
CN109450846A (en) | A kind of EL expression formula injection loophole batch detecting device and detection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20191029 |
|
WW01 | Invention patent application withdrawn after publication |