Headless browser

A headless browser is a web browser without a graphical user interface.

Headless browsers provide automated control of a web page in an environment similar to popular web browsers, but are executed via a command line interface or using network communication. They are particularly useful for testing web pages as they are able to render and understand HTML the same way a browser would, including styling elements such as page layout, colour, font selection and execution of JavaScript and AJAX which are usually not available when using other testing methods.[1][2] Google stated in 2009 that using a headless browser could help their search engine index content from websites that use AJAX.[3]

Use Cases for Headless Browsers

Headless browsers are used for:[4][5]

Malicious Use Cases

Headless browsers can also be used to:

List of Headless Browsers

This is a list of browsers providing a complete or near-complete headless implementation.

Simulated Headless Browsers

These are browsers that simulate a browser environment. While they are able to support common browser features (HTML parsing, cookies, XHR, some javascript, etc.), they do not render DOM and have limited support for DOM events. They usually perform faster than full browsers, but are unable to correctly interpret many popular websites.[19][20][21]

Scriptable Browsers

These are browsers that may still require a user Interface but have programmatic APIs and are intended to be used in ways similar to traditional headless browsers.

See also

References

  1. http://blog.arhg.net/2009/10/what-is-headless-browser.html
  2. http://phantomjs.org/quick-start.html
  3. http://googlewebmastercentral.blogspot.com.au/2009/10/proposal-for-making-ajax-crawlable.html
  4. http://phantomjs.org/
  5. http://triflejs.org/
  6. http://www.business2community.com/tech-gadgets/headless-browser-botnet-used-150-hour-ddos-attack-0688767
  7. http://www.ecommercetimes.com/story/80194.html
  8. http://www.itproportal.com/2014/04/01/headless-browsers-legitimate-software-enables-attack/
  9. https://www.owasp.org/index.php/Credential_stuffing
  10. http://phantomjs.org
  11. http://phantomjs.org/faq.html
  12. https://groups.google.com/forum/#!topic/phantomjs/S7sV3JAalag
  13. https://github.com/ariya/phantomjs/commits/1.0.0
  14. https://github.com/ariya/phantomjs
  15. http://htmlunit.sourceforge.net/
  16. http://vaadin.com/download/release/7.3/7.3.4/docs/api/com/google/gwt/junit/Platform.html
  17. http://triflejs.org/
  18. https://github.com/sdesalas/trifleJS/wiki
  19. https://github.com/assaf/zombie/tree/v3.0.15#faq
  20. http://www.envjs.com/doc/guides
  21. http://www.javascriptmvc.com/docs/funcunit.envjs.html
  22. http://zombie.labnotes.org/
  23. http://www.envjs.com/
  24. http://slimerjs.org/