Dead-end construction method

Source: Internet
Author: User

Zero Customer Network SecurityXiao xiaoshuai! Bytes ﹊

1. Disassemble value ..

There are countless xss in the school ..
The simplest example is ......
For example:
<Form action = "post" name = "bloodsword" value = "">
Xxxx
</Form>

Let me use get as an example. If he supports get, it's easy...
Http://xiaonei.com/fuck.do? Bloodsword = bink "onload = alert (/xss /);
In this way. Check the source code and the result is:
<A href = "http://xiaonei.com/back.do" value = "bink" onload = alert (/xss/)>
This is used in get ...... Most of the sites, as long as you carefully look at the name. Some Hidden elements can be found.
This is because quotation marks have not been filtered out.


2. Character Set xss inject
This method depends on the server ...... I'm not sure...
It is also subject to browser restrictions.

For example, FF

Http://xiaonei.com/do.do? Bink = aaa % afalert ("xss ")


3. Create tags with special points for different browsers.

Continue with the example. For example, in IE6 kernel,
This is gone after IE 7 or above. -. -Is this IE backward compatible ......
There are also FF video tags.
IE8 began to support some strange ones, such as the javascript in the title tag of the anchor.

4. self-built bypass.

For more information, see the rich text Bypass Method.

Some programmers know that xss protection is required, but they do not know that they can bypass

You know that you want to prevent events starting with "o". In this way, you will see onload onclick onreadystatechang onmouseover again.

But oolooad
Ooclick... OK ..
It's very simple. You need to look at rich texts in a complicated way.

5. hexadecimal

In some places, programmers filter a lot. When there is almost no such thing, do not try the hexadecimal system. The hexadecimal system is mainly the one that is afraid of being filtered ..

6. src attributes.
This attribute is almost very common. Some websites know that xss is protected, and they think it will be okay if they end with jpg...
For example, yahoo .... Xss in a profile .. ..

7. cookie xss

This is ...... What DOM and what cookies are directly output. It seems that xxxxxx in the cookie is directly read.
FF can change the cookie. Directly write the script to generate the cookie xss... Google appears once.

8. DOM xss
Similar to cookie principles.
Look at baidu xss week, and you will know that DOM is similar to what I wrote earlier ..

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.