当前位置:网站首页>XSS challenge (1-5) more detailed answers
XSS challenge (1-5) more detailed answers
2022-06-30 14:17:00 【Huaxi GG】
There's already a lot on the Internet about xss The problem-solving idea of the challenge range , But I think I'd better write another one by myself , Just make a note for yourself
LEVEL 1
There's already a lot on the Internet about xss The problem-solving idea of the challenge range , But I think I'd better write another one by myself , Just make a note for yourself
LEVEL 1
There's already a lot on the Internet about xss The problem-solving idea of the challenge range , But I think I'd better write another one by myself , Just make a note for yourself
LEVEL 1
look for xss The method of vulnerability is the same as that of other vulnerabilities , Is to find the input interface , Find a place where you can enter data , Build attack field to achieve attack .
The first pass is obviously in url After the data get Submitted parameters
So build xxxx/leval1.php?name= Pop up the window
LEVEL 2
look for xss The method of vulnerability is the same as that of other vulnerabilities , Is to find the input interface , Find a place where you can enter data , Build attack field to achieve attack .
The first pass is obviously in url After the data get Submitted parameters
So build xxxx/leval1.php?name= Pop up the window

LEVEL 2
look for xss The method of vulnerability is the same as that of other vulnerabilities , Is to find the input interface , Find a place where you can enter data , Build attack field to achieve attack .
The first pass is obviously in url After the data get Submitted parameters
So build xxxx/leval1.php?name= Pop up the window
LEVEL 2

Try alert(/xss/) Found no pop-up window
F12 Navigate to this form , There is nothing wrong with the data , But it doesn't pop up
So it is suspected that sensitive fields have been escaped
Grab the bag and have a look 
There are obviously two angle brackets <> escaped ,
The escape uses htmlspecialchars() Method 
Here is another way of thinking , Obviously , The form data is retained after the jump , therefore , Through the retained form data , It can also achieve the implementation js The effect of
The background processing source code is as follows , You can see what's printed out " Can't find XXXX" The input data is htmlspecialchars() Handle 

First, build. "> Before closing input label
">
Pop up window after jump 
level 3
The input data is also processed , The first thing that comes to mind here is to follow the train of thought of the second question

I found that , The contents of the form are also htmlspecialchars() Method escaped 
The double quotation marks were found to be escaped after the test , Single quotation marks are OK
So build payload ’ οnclick=alert(/xss/)%0a Bypass (> Filtered , So use %0a Line breaks bypass , Note that the data should be written in url in
LEVEL5

After a simple test, I found script The field is modified ,onclick The string is also modified , Try to bypass
adopt payload '><iframe src="javascript:alert(/xss/)> (javascript: It's a fake agreement , Is used to js Code is coupled to html in , Again , There are other pseudo protocols , Search for )
边栏推荐
- [scientific research data processing] [practice] frequency analysis chart of category variables, distribution chart of numerical variables and normality test (including lognormal)
- How to take the first step in digital transformation
- Shell programming overview
- PHP 2D array change key name
- Golang template (text/template)
- [redis series] redis learning 16. Redis Dictionary (map) and its core coding structure
- Prometheus 2.29.0 new features
- Realize a simple LAN communication (similar to feiqiu)
- [Title brushing] heater
- Step by step | help you easily submit Google play data security form
猜你喜欢

Deep understanding Net (2) kernel mode 2 Kernel mode construct semaphone

Observable, seulement fiable: première bombe de salon de la série cloudops d'exploitation et d'entretien automatisés dans le nuage

Deep understanding Net (2) kernel mode 4 Summary of kernel pattern constructs

Mysql database foundation: stored procedures and functions

Geoffreyhinton: my 50 years of in-depth study and Research on mental skills

Defi "where does the money come from"? A problem that most people don't understand

Wuenda 2022 machine learning special course evaluation is coming!
![[scientific research data processing] [practice] frequency analysis chart of category variables, distribution chart of numerical variables and normality test (including lognormal)](/img/5a/eaa845f4332f0b8ee8b6409d6a79e8.png)
[scientific research data processing] [practice] frequency analysis chart of category variables, distribution chart of numerical variables and normality test (including lognormal)

Configuration of headquarters dual computer hot standby and branch infrastructure for firewall Foundation

【刷题篇】爱吃香蕉的珂珂
随机推荐
单元测试效率优化:为什么要对程序进行测试?测试有什么好处?
The first three passes of sqli Labs
SQL attendance statistics monthly report
MFQE 2.0: A New Approach for Multi-FrameQuality Enhancement on Compressed Video
remote: Support for password authentication was removed on August 13, 2021. Please use a personal ac
Directory related commands
QQ was stolen? The reason is
Comprehensively analyze the basic features and summary of free and paid SSH tools
Three uses of golang underscores
Alipay certificate mode payment interface
Why does the folder appear open in another program
ot initialized – call ‘refresh’ before invoking lifecycle methods via the context: Root WebApplicati
Rpm2rpm packaging steps
【Kubernetes系列】K8s设置MySQL8大小写不敏感
Zend studio how to import an existing project
golang模板(text/template)
Detailed explanation of the first three passes of upload Labs
Introduction to the renewal of substrate source code: the pallet alliance is incorporated into the main line,
我想问一下招商证券怎么开户?通过链接办理股票开户安全吗
Deep understanding Net (2) kernel mode 3 Kernel mode construct mutex