当前位置:网站首页>XSS challenge (1-5) more detailed answers
XSS challenge (1-5) more detailed answers
2022-06-30 14:17:00 【Huaxi GG】
There's already a lot on the Internet about xss The problem-solving idea of the challenge range , But I think I'd better write another one by myself , Just make a note for yourself
LEVEL 1
There's already a lot on the Internet about xss The problem-solving idea of the challenge range , But I think I'd better write another one by myself , Just make a note for yourself
LEVEL 1
There's already a lot on the Internet about xss The problem-solving idea of the challenge range , But I think I'd better write another one by myself , Just make a note for yourself
LEVEL 1
look for xss The method of vulnerability is the same as that of other vulnerabilities , Is to find the input interface , Find a place where you can enter data , Build attack field to achieve attack .
The first pass is obviously in url After the data get Submitted parameters
So build xxxx/leval1.php?name= Pop up the window
LEVEL 2
look for xss The method of vulnerability is the same as that of other vulnerabilities , Is to find the input interface , Find a place where you can enter data , Build attack field to achieve attack .
The first pass is obviously in url After the data get Submitted parameters
So build xxxx/leval1.php?name= Pop up the window
LEVEL 2
look for xss The method of vulnerability is the same as that of other vulnerabilities , Is to find the input interface , Find a place where you can enter data , Build attack field to achieve attack .
The first pass is obviously in url After the data get Submitted parameters
So build xxxx/leval1.php?name= Pop up the window
LEVEL 2
Try alert(/xss/) Found no pop-up window
F12 Navigate to this form , There is nothing wrong with the data , But it doesn't pop up
So it is suspected that sensitive fields have been escaped
Grab the bag and have a look
There are obviously two angle brackets <> escaped ,
The escape uses htmlspecialchars() Method
Here is another way of thinking , Obviously , The form data is retained after the jump , therefore , Through the retained form data , It can also achieve the implementation js The effect of
The background processing source code is as follows , You can see what's printed out " Can't find XXXX" The input data is htmlspecialchars() Handle
First, build. "> Before closing input label
">
Pop up window after jump
level 3
The input data is also processed , The first thing that comes to mind here is to follow the train of thought of the second question
I found that , The contents of the form are also htmlspecialchars() Method escaped
The double quotation marks were found to be escaped after the test , Single quotation marks are OK
So build payload ’ οnclick=alert(/xss/)%0a Bypass (> Filtered , So use %0a Line breaks bypass , Note that the data should be written in url in
LEVEL5
After a simple test, I found script The field is modified ,onclick The string is also modified , Try to bypass
adopt payload '><iframe src="javascript:alert(/xss/)> (javascript: It's a fake agreement , Is used to js Code is coupled to html in , Again , There are other pseudo protocols , Search for )
边栏推荐
- 编程实战赛来啦!B站周边、高级会员等好礼送你啦!
- Initial attack and defense world Misc
- [Title brushing] avoid flooding
- Heavyweight: the domestic ide was released, developed by Alibaba, and is completely open source!
- 【刷题篇】供暖器
- Flat shading with unity
- [scientific research data processing] [basic] category variable frequency analysis chart, numerical variable distribution chart and normality test (including lognormal)
- LeetCode_ Stack_ Medium_ 227. basic calculator II (without brackets)
- PHP 2D array change key name
- Google Earth Engine(GEE)——将字符串的转化为数字并且应用于时间搜索( ee.Date.fromYMD)
猜你喜欢
随机推荐
Data recovery software easyrecovery15 Download
Cost forecast of PMP (BAC, EAC, etc)
Lifting scanning tool
SQL attendance statistics monthly report
Go language mutex lock
go time. after
Directory related commands
Why does the folder appear open in another program
重磅:国产IDE发布,由阿里研发,完全开源!
What is erdma as illustrated by Coptic cartoon?
(8) JMeter component detailed once only controller
深入理解.Net中的线程同步之构造模式(二)内核模式4.内核模式构造物的总结
Implementation of forwarding server using IO multiplexing
Unity animator parameter
【刷题篇】爱吃香蕉的珂珂
@component使用案例
The first three passes of sqli Labs
Attack and defense world web questions
Crypto questions
How to execute a query SQL