官术网_书友最值得收藏!

Putting It All Together

So what does it look like when we put it all together? It's simple – we can construct a one-liner to scan the JavaScript of a target site just by passing the right directory references:

grabjs https://www.target.site sourcejs; scanjs sourcejs output.json | formatjs

Keep in mind we've already symlinked these scripts to our /usr/local/bin and changed their permissions using chmod u+x to make them executable and accessible from our path. With this command, we're telling our CL to download the JavaScript from http://target.site to the sourcejs directory, then scan that directory, create an output.json representation of the data, and finally format everything as a plain-text report.

As a means of testing the command, I  recently read a blog decrying the fact that jQuery, responsible for a large chunk of the web's client-side code, was running an out-of-date WordPress version on http://jquery.com/, so I decided to see whether their JavaScript had any issues:

grabjs https://jquery.com sourcejs; scanjs sourcejs output.json | formatjs

The fact that http://jquery.com/ has a few issues is nothing huge, but still surprising! Known component vulnerabilities in JavaScript are a widespread issue, affecting a sizable portion of sites (different methodologies put the number of affected sites at between one-third and three-quarters of the entire web).

主站蜘蛛池模板: 峡江县| 拉萨市| 如皋市| 水富县| 潼南县| 望城县| 盐津县| 皮山县| 修文县| 麻江县| 龙游县| 改则县| 比如县| 康保县| 五台县| 喀什市| 卢氏县| 年辖:市辖区| 视频| 阳泉市| 阿尔山市| 雷山县| 皮山县| 醴陵市| 鞍山市| 历史| 甘谷县| 霍林郭勒市| 全南县| 延吉市| 奈曼旗| 无极县| 北海市| 庄河市| 醴陵市| 吉木萨尔县| 普宁市| 辽阳市| 会宁县| 吐鲁番市| 孝昌县|