Home > Aplication > Introducing DOM Snitch, our passive in-the-browser reconnaissance tool
Introducing DOM Snitch, our passive in-the-browser reconnaissance tool
Posted on 22 Juni 2011 by c0decstuff
Every day modern web applications are becoming increasingly sophisticated, and as their complexity grows so does their attack surface. Previously we introduced open source tools such as Skipfish and Ratproxy to assist developers in understanding and securing these applications.
As existing tools focus mostly on testing server-side code, today we are happy to introduce DOM Snitch — an experimental* Chrome extension that enables developers and testers to identify insecure practices commonly found in client-side code. To do this, we have adopted several approaches to intercepting JavaScript calls to key and potentially dangerous browser infrastructure such as document.write or HTMLElement.innerHTML (among others). Once a JavaScript call has been intercepted, DOM Snitch records the document URL and a complete stack trace that will help assess if the intercepted call can lead to cross-site scripting, mixed content, insecure modifications to the same-origin policy for DOM access, or other client-side issues.
Here are the benefits of DOM Snitch:
- Real-time: Developers can observe DOM modifications as they happen inside the browser without the need to step through JavaScript code with a debugger or pause the execution of their application.
- Easy to use: With built-in security heuristics and nested views, both advanced and less experienced developers and testers can quickly spot areas of the application being tested that need more attention.
- Easier collaboration: Enables developers to easily export and share captured DOM modifications while troubleshooting an issue with their peers.
DOM Snitch is intended for use by developers, testers, and security researchers alike. Click here to download DOM Snitch. To read the documentation, please visit this page.
*Developers and testers should be aware that DOM Snitch is currently experimental. We do not guarantee that it will work flawlessly for all web applications. More details on known issues can be found here or in the project’s issues tracker.
Source:googletesting
Category Article Aplication
One Response to “c0decstuff”
Total Pageviews
Labels
- Android (1)
- Aplication (14)
- ARP (1)
- Backdoored (2)
- Browser (1)
- Cloud (1)
- Exploitation (1)
- Exploits (7)
- Facebook (2)
- forensics (3)
- Hacking (11)
- Hijacking (1)
- Honeypot (1)
- HTML5 (1)
- ios (2)
- Jailbreak (2)
- Linux (1)
- Malware (5)
- metasploit (2)
- Meterpreter (1)
- Movie (1)
- Networking (1)
- News (2)
- password attack (2)
- Penetration Test (2)
- Python (1)
- reverse engineering (1)
- Rootkits (1)
- Security (12)
- shellcode (2)
- Stuxnet/Duqu (2)
- Uncategories (1)
- Virus (1)
- Vulnerability (8)
- Web (5)
- Wifi (1)
- Windows (5)
Blog Archive
-
▼
11
(51)
-
▼
Jun
(11)
- Passive Analysis of SSH Traffic
- DotDotPwn v2.1 - The Traversal Directory Fuzzer
- DotDotPwn - The Directory Traversal Fuzzer
- mitmproxy
- Tomahawk, your IDS/Firewall Best Friend
- Introducing DOM Snitch, our passive in-the-browser...
- Metasploit 3.7.2 adds 11 new exploits
- IM worm targeting Brazilian Facebook users
- LulzSec Suspect Taken Into Custody
- Creating a 13 line backdoor worry free of A/V
- Searching the Registry using PowerShell
-
▼
Jun
(11)
Friendlist
Security Resources
-
-
-
This feed contains no entries
-
-
-
-
-
-
-
-
-
سيارات مجهزة ومبطنة من الداخل لكي يتم نقل العفش في امان تام بدون خدوش او تكسير مثل الشركات التالية
- شركة نقل عفش بجده
- شركة نقل اثاث بمكة المكرمة
- شركة نقل عفش بالطائف
وفي منطقة المدينة المنورة تجدنا نمتلك افضل شركات نقل الاثاث مع الفك والتركيب وكذلك في ينبع وينبع البحر مثال عن تلك الشركات
- شركه نقل اثاث بالمدينه المنوره
- شركة نقل اثاث بينبع