当前位置:网站首页>XSS challenge (1-5) more detailed answers
XSS challenge (1-5) more detailed answers
2022-06-30 14:17:00 【Huaxi GG】
There's already a lot on the Internet about xss The problem-solving idea of the challenge range , But I think I'd better write another one by myself , Just make a note for yourself
LEVEL 1
There's already a lot on the Internet about xss The problem-solving idea of the challenge range , But I think I'd better write another one by myself , Just make a note for yourself
LEVEL 1
There's already a lot on the Internet about xss The problem-solving idea of the challenge range , But I think I'd better write another one by myself , Just make a note for yourself
LEVEL 1
look for xss The method of vulnerability is the same as that of other vulnerabilities , Is to find the input interface , Find a place where you can enter data , Build attack field to achieve attack .
The first pass is obviously in url After the data get Submitted parameters
So build xxxx/leval1.php?name= Pop up the window
LEVEL 2
look for xss The method of vulnerability is the same as that of other vulnerabilities , Is to find the input interface , Find a place where you can enter data , Build attack field to achieve attack .
The first pass is obviously in url After the data get Submitted parameters
So build xxxx/leval1.php?name= Pop up the window

LEVEL 2
look for xss The method of vulnerability is the same as that of other vulnerabilities , Is to find the input interface , Find a place where you can enter data , Build attack field to achieve attack .
The first pass is obviously in url After the data get Submitted parameters
So build xxxx/leval1.php?name= Pop up the window
LEVEL 2

Try alert(/xss/) Found no pop-up window
F12 Navigate to this form , There is nothing wrong with the data , But it doesn't pop up
So it is suspected that sensitive fields have been escaped
Grab the bag and have a look 
There are obviously two angle brackets <> escaped ,
The escape uses htmlspecialchars() Method 
Here is another way of thinking , Obviously , The form data is retained after the jump , therefore , Through the retained form data , It can also achieve the implementation js The effect of
The background processing source code is as follows , You can see what's printed out " Can't find XXXX" The input data is htmlspecialchars() Handle 

First, build. "> Before closing input label
">
Pop up window after jump 
level 3
The input data is also processed , The first thing that comes to mind here is to follow the train of thought of the second question

I found that , The contents of the form are also htmlspecialchars() Method escaped 
The double quotation marks were found to be escaped after the test , Single quotation marks are OK
So build payload ’ οnclick=alert(/xss/)%0a Bypass (> Filtered , So use %0a Line breaks bypass , Note that the data should be written in url in
LEVEL5

After a simple test, I found script The field is modified ,onclick The string is also modified , Try to bypass
adopt payload '><iframe src="javascript:alert(/xss/)> (javascript: It's a fake agreement , Is used to js Code is coupled to html in , Again , There are other pseudo protocols , Search for )
边栏推荐
- [observation] as the intelligent industry accelerates, why should AI computing power take the lead?
- I want to ask how to open an account at China Merchants Securities? Is it safe to open a stock account through the link
- @ResponseBody的作用
- Error on datetime when importing SQL file from MySQL
- 【科研数据处理】[实践]类别变量频数分析图表、数值变量分布图表与正态性检验(包含对数正态)
- Mysql database foundation: stored procedures and functions
- PHP multidimensional array sorting
- 數據恢複軟件EasyRecovery15下載
- Jetpack compose for perfect screen fit
- Shell programming overview
猜你喜欢

Lifting scanning tool

Zend studio how to import an existing project
![[scientific research data processing] [practice] frequency analysis chart of category variables, distribution chart of numerical variables and normality test (including lognormal)](/img/5a/eaa845f4332f0b8ee8b6409d6a79e8.png)
[scientific research data processing] [practice] frequency analysis chart of category variables, distribution chart of numerical variables and normality test (including lognormal)

This article explains the concepts of typed array, arraybuffer, typedarray, DataView, etc

This editor will open source soon!

深入理解.Net中的线程同步之构造模式(二)内核模式4.内核模式构造物的总结

MySQL back to table query optimization

The first three passes of sqli Labs

remote: Support for password authentication was removed on August 13, 2021. Please use a personal ac

Optimization of unit test efficiency: why test programs? What are the benefits of testing?
随机推荐
MFQE 2.0: A New Approach for Multi-FrameQuality Enhancement on Compressed Video
[observation] as the intelligent industry accelerates, why should AI computing power take the lead?
Click the TD cell of table to open the dialog pop-up window. After obtaining the value, put the value back into the TD cell
单元测试效率优化:为什么要对程序进行测试?测试有什么好处?
What is erdma as illustrated by Coptic cartoon?
香港回归20余年,图扑数字孪生港珠澳大桥,超震撼
Go sync. WaitGroup
With the development of industrial Internet, the landing and application of the Internet has become wider
Four isolation levels of MySQL
Go language for loop multivariable use
(8) JMeter component detailed once only controller
Wuenda 2022 machine learning special course evaluation is coming!
The programming competition is coming! B station surrounding, senior members and other good gifts to you!
深入理解.Net中的线程同步之构造模式(二)内核模式2.内核模式构造物Semaphone
[the path of system analyst] Chapter 5 Software Engineering (Agile Development)
Knowledge dissemination cannot replace professional learning!
VisualStudio and SQL
What network security problems are exposed when a large-scale QQ number theft event occurs?
How to execute a query SQL
Go language mutex lock