Here in Computer Security Lab we are working on a client-side JavaScript code
analysis algorithm for discovering HTTP requests that can be sent by that code
to server (AJAX requests). The goal is to then give this information to a web
security scanner working in black-box mode (without server source code
access). So that the scanner knows which requests are accepted by the server
and, therefore, where to insert the attack vectors. We are ourselves making a
web security scanner SolidPoint that uses this
analysis algorithm. In this post (and in the next couple), I’ll talk
about this analysis: why did we start making it, how does it work and what do
we get as a result. I’ll also share a link to the analyzer’s source code — we’ve made
it public!