Font Size: a A A

Research Of Web Application Security Vulnerabilities Mining

Posted on:2011-12-31Degree:MasterType:Thesis
Country:ChinaCandidate:K LuFull Text:PDF
GTID:2178360302491173Subject:Cryptography
Abstract/Summary:PDF Full Text Request
As the Internet enter the web2.0 era, web applications have received widespread welcome. Web applications are widely applied in many systems such as medicine, financial and military, but at the same time, these fields are in high demand for security. Vulnerability mining is an important means of ensuring web application security. Timely detecting and repairing security vulnerabilities can greatly enhance the web application security. Therefore, the study of web vulnerabilities mining techniques and development of web vulnerabilities mining software are of great significance to enhancing web application security.This paper chooses the open-source vulnerability mining tool Paros Proxy based on web intercepting proxy as the research object. The main work is as follows:1. More comprehensively analyze and summarize of the existing web vulnerabilities mining technology, and give the problems faced.2. Analyze and compare of the two types of web application vulnerabilities mining tools: web intercepting proxy and web application vulnerabilities scanner, point out the advantages of web intercepting proxy, and detail analyze of web intercepting proxy's framework and functions. At the same time, point out the existing and weaknesses of Paros Proxy.3. Through the in-depth analysis and research of Paros Proxy's spider module, it implements the session tracking functionality during the whole process of crawling when crawling and parsing web pages required session authentication.4. Through the in-depth analysis and research of Paros Proxy's spider module, it implements the parsing and extraction of URL generated by JavaScript. Because using interfaces provided by IE core Trident(mshtml.dll) in the process of parsing JavaScript URLs, it parses web pages and extracts all URLs.5. The improved detection module of SQL Injection detects SQL Injection vulnerabilities respectively from the Error-Based SQL Injection, Union-Based SQL Injection, Blind SQL Injection, and there is a configuration file that stores the strings of detection. So, it provides the good scalability and flexibility. Meanwhile, it also implements the detection of Cookie Injection.The innovation is the implement of session tracking functionality and extraction of URLs generated by JavaScript. And it parses web pages and extracts all URLs. Meanwhile, it greatly raises the detection efficiency of the detection module of SQL Injection.
Keywords/Search Tags:Interepting Proxy, Web Spider, Cookie, URL, SQL Injection
PDF Full Text Request
Related items