Dynamically scanning a web application through use of web traffic information
First Claim
Patent Images
1. A system that dynamically scans a web application to perform a security analysis of the web application comprising:
- a computer-readable storage medium; and
a processor configured to initiate executable operations comprising;
collecting log file data from at least one log file, collecting the log file data comprising matching information from a previous HTTP request, which lead to a subsequent HTTP request being generated, using stateful parsing to identify information about at least one HTML parameter type by marking a certain parameter of the previous HTTP request as a parameter originating from a form or a hyperlink;
entering data from the collected log file data into at least one data file;
scanning the at least one data file to identify information relevant to security testing;
from the identified information relevant to the security testing, generating at least a first HTTP request to exercise a web application to perform the security analysis of the web application, the first HTTP request corresponding to a second HTTP request generated by prior use or development of the web application and contained in the log file, the first HTTP request including form data that is different than form data contained in the second HTTP request and configured to specifically test for security vulnerabilities in the web application;
communicating the HTTP request to the web application;
receiving at least one HTTP response to the first HTTP request;
analyzing the HTTP response to perform validation of the web application; and
outputting results of the validation.
1 Assignment
0 Petitions
Accused Products
Abstract
Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output.
-
Citations
14 Claims
-
1. A system that dynamically scans a web application to perform a security analysis of the web application comprising:
-
a computer-readable storage medium; and a processor configured to initiate executable operations comprising; collecting log file data from at least one log file, collecting the log file data comprising matching information from a previous HTTP request, which lead to a subsequent HTTP request being generated, using stateful parsing to identify information about at least one HTML parameter type by marking a certain parameter of the previous HTTP request as a parameter originating from a form or a hyperlink; entering data from the collected log file data into at least one data file; scanning the at least one data file to identify information relevant to security testing; from the identified information relevant to the security testing, generating at least a first HTTP request to exercise a web application to perform the security analysis of the web application, the first HTTP request corresponding to a second HTTP request generated by prior use or development of the web application and contained in the log file, the first HTTP request including form data that is different than form data contained in the second HTTP request and configured to specifically test for security vulnerabilities in the web application; communicating the HTTP request to the web application; receiving at least one HTTP response to the first HTTP request; analyzing the HTTP response to perform validation of the web application; and outputting results of the validation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product for dynamically scanning a web application to perform a security analysis of the web application, the computer program product comprising:
-
a computer-readable storage device, wherein the computer-readable storage device is not a transitory, propagating signal per se, having computer-readable program code embodied therewith, the computer-readable program code comprising; computer-readable program code configured to collect log file data from at least one log file; computer-readable program code configured to enter data from the collected log file data into at least one data file, collecting the log file data comprising matching information from a previous HTTP request, which lead to a subsequent HTTP request being generated, using stateful parsing to identify information about at least one HTML parameter type using stateful parsing to identify information about at least one HTML parameter type by marking a certain parameter of the previous HTTP request as a parameter originating from a form or a hyperlink; computer-readable program code configured to scan the at least one data file to identify information relevant to security testing; computer-readable program code configured to, from the identified information relevant to the security testing, generate at least a first HTTP request to exercise a web application to perform the security analysis of the web application, the first HTTP request corresponding to a second HTTP request generated by prior use or development of the web application and contained in the log file, the first HTTP request including form data that is different than form data contained in the second HTTP request and configured to specifically test for security vulnerabilities in the web application; computer-readable program code configured to communicate the first HTTP request to the web application; computer-readable program code configured to receive at least one HTTP response to the first HTTP request; computer-readable program code configured to analyze the HTTP response to perform validation of the web application; and computer-readable program code configured to output results of the validation. - View Dependent Claims (10, 11, 12, 13, 14)
-
Specification