Webpage loophole detecting method and device

A vulnerability detection and web page technology, applied in the computer field, can solve problems such as incomplete detection, and achieve the effect of solving incomplete detection, ensuring flexibility, and avoiding individual omissions.

Active Publication Date: 2015-09-30
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiment of the present invention provides a webpage vulnerability detection method and device, to at least solve the technical problem of incomplete detection caused by the existence of loopholes and omissions in the existing webpage vulnerability detection technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webpage loophole detecting method and device
  • Webpage loophole detecting method and device
  • Webpage loophole detecting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] According to an embodiment of the present invention, an embodiment of a method for detecting a webpage vulnerability is provided, wherein the above method for detecting a webpage vulnerability can be applied to, but not limited to, such as figure 1 In the network environment shown, the above network environment includes a terminal 102 and a server 104 . Optionally, in this embodiment, the terminal 102 may include but not limited to at least one of the following: a mobile phone, a tablet computer, a notebook computer, and a PC. Optionally, in this embodiment, the foregoing network may include but not limited to at least one of the following: a wide area network, a metropolitan area network, and a local area network. For example, a predetermined Uniform Resource Locator URL (Uniform Resource Locator) address is input into the browser on the terminal 102, corresponding webpage data is obtained from the corresponding server 104 through the network, and vulnerability detecti...

Embodiment 2

[0073] According to an embodiment of the present invention, an embodiment of a webpage vulnerability detection device is provided, wherein the above-mentioned webpage vulnerability detection device can be applied, but not limited to, such asfigure 1 In the network environment shown, the above network environment includes a terminal 102 and a server 104 . Optionally, in this embodiment, the terminal 102 may include but not limited to at least one of the following: a mobile phone, a tablet computer, a notebook computer, and a PC. Optionally, in this embodiment, the foregoing network may include but not limited to at least one of the following: a wide area network, a metropolitan area network, and a local area network. For example, a predetermined Uniform Resource Locator URL (Uniform Resource Locator) address is input into the browser on the terminal 102, corresponding webpage data is obtained from the corresponding server 104 through the network, and vulnerability detection is p...

Embodiment 3

[0119] According to an embodiment of the present invention, an embodiment of a terminal for implementing the above webpage vulnerability detection method is provided, wherein the above terminal can be applied to, but not limited to, such as figure 1 In the network environment shown, the above network environment includes a terminal 102 and a server 104 . Optionally, in this embodiment, the terminal 102 may include but not limited to at least one of the following: a mobile phone, a tablet computer, a notebook computer, and a PC. Optionally, in this embodiment, the foregoing network may include but not limited to at least one of the following: a wide area network, a metropolitan area network, and a local area network. For example, a predetermined Uniform Resource Locator URL (Uniform Resource Locator) address is input into the browser on the terminal 102, corresponding webpage data is obtained from the corresponding server 104 through the network, and vulnerability detection is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a webpage loophole detecting method and device. The webpage loophole detecting method includes acquiring webpage data to be detected, and looking up whether the webpage data to be detected includes target tags or not, wherein the target tags are used for marking initial loading positions of the webpage data to be detected; if the target tags are found, inserting loophole detecting codes in the positions after the target tags in the webpage data; operating the loophole detecting codes when the webpage data is loaded; detecting webpage loopholes by operating the loophole detecting codes and executing operations corresponding to the webpage loopholes. The webpage loophole detecting method solves the technical problem that existing webpage loophole detecting technology is incomplete in detection due to loophole missing.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a method and device for detecting webpage loopholes. Background technique [0002] At present, when performing web page vulnerability detection, the following two available vulnerability detection schemes are mainly used: [0003] 1. Based on the source code patch, port the official Webkit patch code to the corresponding Android source code to provide a secure Webkit kernel. [0004] Although it is safer to use this method, and it is faster and more convenient to make patches, however, this method cannot be updated in time. It needs to bring its own independent browser kernel. At the same time, it will increase the storage volume of the APP, or flash the ROM, and cannot be rooted if it is not supported. mobile phone. [0005] 2. Based on the Hook technology hot patch, refer to the official Webkit patch code to dynamically patch the Webkit kernel of the APP's own running space t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F17/30
Inventor 丁冉
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products