Tracking changes in HTML pages with hashing and Python

In the digital world, integrity of data plays an important role. Integrity is used primarily to make sure that data are transferred intact through a communication channel. To calculate the integrity of data, various hashing algorithms exist and are used for that purpose - the most popular of which are MD5, SHA256 and SHA512. Hashing is in the digital space the equivalent of what our brain does when we notice changes around us. We get a past image and compare it with the current one, without maintaining a record of each and every detail.

However, integrity checks are additionally used to monitor attacker infrastructure and thus assist in threat intelligence. A human brain cannot tell if a blank HTML page - as it’s displayed on the browser - hides content that changes over time. By hashing the response that a web server sends to clients and repeating this process frequently, it becomes possible for humans to observe changes in the content of the tracked page.

Threat Intel use case: Monitor attacker infrastructure

Let’s assume that a threat actor hosts malicious code on a benign-looking HTML page. For the sake of this post, let’s also assume that the malicious code, is enclosed within HTML comments for the launcher to be able to locate that code. The hosted code may change over time, as the attacker adopts new techniques, attacks new targets or makes any sort of changes on their infrastructure.

To effectively monitor these changes, hashing comes into play. By locating the area on a page where the malicious code is hosted, a threat intelligence analyst - or anyone who is keen to monitor attacker infrastructure - can simply hash the content and with this track changes to the page.

Python code

This section hosts a short implementation in Python of what has been discussed above.

The code povided below:

import urllib.request
from html.parser import HTMLParser
import hashlib
import io

deli_line=[]

class MyHTMLParser(HTMLParser):
    def handle_comment(self, deli):
        # parse html and return the line of the delimiter
	# select delimiter start/end
        if deli in ['', '']:
            line, offset = self.getpos()
            deli_line.append(line)

def deltaf():
    # CHANGE ME
    url = ''
    req = urllib.request.Request(url)
    resp = urllib.request.urlopen(req)
    data = resp.read()
    resp.close()

    parser = MyHTMLParser()
    parser.feed(data.decode())
    parser.close()

    # parse stream into lines
    stream = io.BytesIO(data)
    lines = stream.readlines()

    b = b''
    for i in range(deli_line[0], deli_line[1]-1):
        b = b + lines[i]

    # calculate hash
    h = hashlib.new('sha256')
    h.update(b)
    newhsh = h.hexdigest()

    # hardcoded hash
    hsh = ''
    if (newhsh != hsh):
        print("[!] Page has been altered")
    else:
        print("[+] No change")

if __name__ == '__main__':
    deltaf()
tags: #threat intelligence