| |

VerySource

 Forgot password?
 Register
Search
View: 1871|Reply: 6

Ask web browser attack detection

[Copy link]

1

Threads

3

Posts

4.00

Credits

Newbie

Rank: 1

Credits
4.00

 Invalid IP Address

Post time: 2020-1-20 14:00:01
| Show all posts |Read mode
The requirement is to intercept packets, analyze communication protocols, and detect attacks against Web browsers.
My current program has been able to intercept the package and get the meaning of the fields of the package, but I don't know what kind of characteristics are the signs of attacking the web browser, I hope you masters.
Reply

Use magic Report

1

Threads

3

Posts

4.00

Credits

Newbie

Rank: 1

Credits
4.00

 Invalid IP Address

 Author| Post time: 2020-2-9 20:00:01
| Show all posts
It ’s okay if the function is simple. The key is that there is no idea now.
Reply

Use magic Report

0

Threads

5

Posts

6.00

Credits

Newbie

Rank: 1

Credits
6.00

 China

Post time: 2020-2-18 11:00:01
| Show all posts
In my opinion, it is better to target the web browser attack against the system. The browser is just a springboard. Like installing some ActiveX controls (rogue software, etc.) in the background, modifying system files, or injecting malicious code (virus Trojans, etc.), you can think of so much.
Reply

Use magic Report

0

Threads

21

Posts

19.00

Credits

Newbie

Rank: 1

Credits
19.00

 China

Post time: 2020-2-19 22:30:01
| Show all posts
Detect attacks against web browsers
------------
Are browser attacks useful? Web servers
Reply

Use magic Report

0

Threads

8

Posts

7.00

Credits

Newbie

Rank: 1

Credits
7.00

 China

Post time: 2020-3-10 09:00:01
| Show all posts
ActiveX is more popular. . . .
Expressing concern ~~
Reply

Use magic Report

1

Threads

3

Posts

4.00

Credits

Newbie

Rank: 1

Credits
4.00

 Invalid IP Address

 Author| Post time: 2020-3-20 09:00:01
| Show all posts
Browser attacks now should be said to be a new trend. Rogue software and account theft should belong to this category. Hehe, of course, this is actually a job requirement, so I ca n’t change anything, so I want to explore What can you do after grabbing the package to find some signs of attack? For example, the initial thoughts include reorganizing the HTML file to analyze the scripting language inside it, and the analysis of ActiveX. I don't know if it is feasible.
Reply

Use magic Report

0

Threads

21

Posts

19.00

Credits

Newbie

Rank: 1

Credits
19.00

 China

Post time: 2020-3-29 14:00:01
| Show all posts
Rogue software and account theft should be different from the packet capture you said

Rogue software and account theft are proactively obtaining information
Capture is passive

Restructure the HTML file to analyze the scripting language inside, and ActiveX
-------------------------
The data that you capture is also downloaded from the server is normal, unless there is a problem with the server itself, this should not be your purpose
Reply

Use magic Report

You have to log in before you can reply Login | Register

Points Rules

Contact us|Archive|Mobile|CopyRight © 2008-2023|verysource.com ( 京ICP备17048824号-1 )

Quick Reply To Top Return to the list