计算机科学 ›› 2011, Vol. 38 ›› Issue (Z10): 41-43.

• 信息安全 • 上一篇    下一篇

基于代码覆盖的浏览器漏洞利用攻击检测方法

孟辰   

  1. (同济大学电子与信息工程学院 上海201804)
  • 出版日期:2018-11-16 发布日期:2018-11-16

Web Browser Vulnerability Exploitation Attack Test Technology Based on Code Overriding

MENG Chen   

  • Online:2018-11-16 Published:2018-11-16

摘要: 根据漏洞利用攻击的概念验证,使用W inDbg逆向工程找出该类攻击的特征,并根据该特征编写检测代码。而后将检测代码封装至DLL中,并通过远程线程方式将DLL注入网页浏览器。被注入的DLL会以代码覆盖的方法拦截浏览器的API,使浏览器跳转到检测代码。根据浏览器打开网址时检测代码的返回值,来判断该网址是否包含利用该漏洞进行攻击的网页木马。通过将该技术部署于众多虚拟机中,批量检测网页,来向杀毒软件公司以及搜索引擎等提供高可信度的挂马网页黑名单。

关键词: 漏洞利用攻击,概念验证,代码覆盖,网页木马,逆向工程,API拦截,DI.工注入

Abstract: Based on the proofs of concept for vulnerability exploitation attack, we can find the characteristic of the attack through reverse engineering using WinDbg and write test code according to the characteristic. We then encapsulate the test code into a DLL and inject the DLL into Web browser through remote thread. The injected DLL will hook browser's API by means of code overriding, so that the browser will jump to the test code. I3y visiting a website and acknowledging the return value of the injected code to judge whether the webpage contains trojan horse using the vulnerability. I3y deploying this technology into numerous virtual machines, we can analyze webpages in bulk, and then provide high-quality webpages blacklist to antivirus software companies and search engines.

Key words: Vulnerability exploitation attack, Proof of concept, Code overriding, Webpage trojan horse, Reverse engineering,APIhooking,DLL injection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!