首页> 外文会议>IFIP TC 11 International conference on information security and privacy >XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners
【24h】

XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners

机译:XSS PEEKER:剖析Blackbox Web应用程序扫描程序的XSS开发技术和模糊机制

获取原文

摘要

Black-box vulnerability scanners can miss a non-negligible portion of vulnerabilities. This is true even for cross-site scripting (XSS) vulnerabilities, which are relatively simple to spot. In this paper, we focus on this vulnerability class, and systematically explore 6 black-box scanners to uncover how they detect XSS vulnerabilities, and obtain useful insights to understand their limitations and design better detection methods. A novelty of our workflow is the retrofitting of the testbed so as to accommodate payloads that triggered no vulnerabilities in the initial set. This has the benefit of creating a systematic process to increase the number of test cases, which was not considered by previous testbed-driven approaches.
机译:黑盒漏洞扫描程序可能会漏掉一部分不可忽略的漏洞。即使对于跨站点脚本(XSS)漏洞(相对较容易发现)也是如此。在本文中,我们将重点放在此漏洞类别上,并系统地探索6个黑盒扫描程序,以发现它们如何检测XSS漏洞,并获得有用的见解以了解其局限性并设计更好的检测方法。我们工作流程的新颖之处在于,对测试平台进行了改造,以适应有效载荷,该载荷不会在初始设置中触发任何漏洞。这样做的好处是可以创建一个系统的过程来增加测试用例的数量,而以前的测试平台驱动的方法并未考虑到这一点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号