Tracing JavaScript Value Origins in Modern SPAs: Breakpoint-Driven Heap Search (BDHS)
作者介绍了一种基于CDP的JavaScript值溯源技术Breakpoint-Driven Heap Search (BDHS),通过调试器暂停捕获堆快照并搜索目标值,识别其首次出现的用户函数。同时实现Live Object Search功能,在运行时实时匹配和修补对象。该技术适用于SPA逆向工程、XSS分析、反机器人逻辑追踪等场景。 2025-12-5 14:48:50 Author: www.reddit.com(查看原文) 阅读量:0 收藏

I've been experimenting with a CDP-based technique for tracing the origin of JavaScript values inside modern, framework-heavy SPAs.

The method, called Breakpoint-Driven Heap Search (BDHS), performs step-out-based debugger pauses, captures a heap snapshot at each pause, and searches each snapshot for a target value (object, string, primitive, nested structure, or similarity signature).
It identifies the user-land function where the value first appears, avoiding framework and vendor noise via heuristics.

Alongside BDHS, I also implemented a Live Object Search that inspects the live heap (not just snapshots), matches objects by regex or structure, and allows runtime patching of matched objects.
This is useful for analyzing bot-detection logic, state machines, tainted values, or any internal object that never surfaces in the global scope.

Potential use cases: SPA reverse engineering, DOM XSS investigations, taint analysis, anti-bot logic tracing, debugging minified/obfuscated flows, and correlating network payloads with memory structures.


文章来源: https://www.reddit.com/r/netsec/comments/1pewyze/tracing_javascript_value_origins_in_modern_spas/
如有侵权请联系:admin#unsafe.sh