Storage-type XSS and Dom-type XSS"Principle of XSS"Storage-Type XSS1, can be long-term storage on the server side2, each user access will be executed JS script, the attacker can only listen to the specified port#攻击利用方法大体等于反射型xss利用# #多出现在留言板等位置* Recommended use of BurpsuiteA, observe the return results, whether to retur
I believe that all of you have had this experience when doing penetration testing, obviously an XSS loophole, but there are XSS filtering rules or WAF protection cause we can not successfully use, such as our input
1. Bypassing MAGIC_QUOTES_GPC
Magic_quotes_gpc=on is a security setting in PHP that will rotate some special characters, such as ' (single quotes) to \, "(double quotes) to \, \ to \
For example
The experience and techniques of XSS detection are summarized as follows
1. Find all the sub stations under the qq.com domain
Usually find the method of the sub domain name I choose to use the third party fofa.so and 5118.com Basic find a lot, sometimes idle egg pain also wrote the sub domain name blasting tool, but if not based on word dictionary but a character blasting, this sample is very large, also not too realistic. Therefore, the qq.com of t
Team: http://www.ph4nt0m.orgBlog: http://superhei.blogbus.com
I. Owning Ha.ckers.org
Some time ago, in Sirdarckcat and Kuza55 "Owning Ha.ckers.org", xss and other attacks were used for penetration. [the attack was unsuccessful, but the technical details are worth learning], for detailed technical details, refer:1. Sirdarckcat's blog:Http://sirdarckcat.blogspot.com/2007/11/inside-history-of-hacking-rsnake-for.html2. rSnake's blog:
Http://ha.ckers.org/b
displayed, that is, the Code is executed, not displayed on the page? Effect of the suffix string
You can use a forged url to obtain user cookies.
For example, add document. cookie = ("name = 123"); in Example 1, set the cookie, and construct the url as follows to pass the cookie in the localhost domain to and search
Http: // 127.0.0.1/attrck.html? Search =
Because cookies prohibit cross-origin access, but the forged url, the browser will think it
Reflected XSS (Cross-Site Scripting reflection)This is the most common and most well-known XSS attack. When the Web Client submits data, the server immediately generates a result page for this customer. If the result page contains unverified client input data, the client script is allowed to be directly injected into the dynamic page. The traditional example is the site search engine. If we search for a
XSS Cookie Theft (DVAW platform test)
In the face of the competition, one question was to write a script to receive Cookies, so I simulated the XSS environment.
PS: WAF filtering is not considered.
First, the XSS is stored. Currently, the DVAW security level is low.
I haven't written a Web page for a long time-I forgot
Tags: c style class blog code java format string format string vulnerability Consider the following code: 1 #include 2int main ()3{4 int a=44,b=77; 5 printf ("a=%d, b=%d\n", b); 6 printf ("a=%d, b=%d\n"); 7 return 0; 8 } View Code The 6th Line of printf () did not set the parameters correctly, and C did not force the check. The result of line 6th on the XP SP2 VM (VC6.0 release version) is
0x00 background
This article is from the bypass XSS filtering section in Modern Web Application firewils Fingerprinting and Bypassing xss Filters. The previous test method for determining which WAF is based on WAF features is skipped, let's take a look at some basic test procedures for
%0a1,2,3/*uyg.php?id=1/**/union%a0select/**/1,pass,3 ' A ' from ' users 'Uyg.php?id= (0) union (SELECT (TABLE_SCHEMA), TABLE_NAME, (0) from (information_schema.tables) have ((Table_schema) Like (0x74657374) (table_name)! = (0x7573657273))) #Uyg.php?id=union (select (version ()))--uyg.php?id=123/*! UNION ALL Select version () */--Uyg.php?id=123/*!or*/1=1;uyg.php?id=1+union+select+1,2,3/*uyg.php?id=1+union+select+1,2,3--uyg.php?id=1+union+select+1,2,3#uyg.php?id=1+union+select+1,2,3;%0 0Uyg.php?i
The test will involve the XSS test, the following summary of the knowledge of XSSXSS Cross-site scripting feature is the ability to inject malicious HTML/JS code into the user's browser, hijacking user sessionsCommon alert to verify that a Web site has a vulnerabilityIf a vulnerability is identified, it can be compromised as the injected content is differentFor e
Test 178 Intranet through a storage XSS
Test the 178 Intranet attachment payload through a storage XSS
Site: http://apt.178.com/The input is not filtered when an app or ringtone resource is added.As follows:
After the upload, it will be displayed on the front-end only after the Administrator reviews it.Then you can ma
Let's briefly talk about it this time. During the video playing process of Tudou, if there is another video, it will be about 10 seconds at the end, the system will prompt "the video to be played next is XXXX", that is, before playing back, Tudou will read the content in the next video and wait for execution. At this time, the title name of the video is obtained. Because of this, XSS is available... If the title of the next video contains an
I went to the street online for an internship in the past few months. Currently, it is the most authoritative website for enterprise school recruitment. After a simple test, I have everything available for storage and rebound XSS. Http://www.dajie.com/http://www.dajie.com/card/exchange/index? KeyWords = 1234 '); alert (document. cookie );//No filtering. In addition, there are stored
80SEC unofficial gossip BLOG
It should be a year or two.
1. First, the CSS-type XSS will be filtered
In #2, insert {XSS} in the comment}
In #1, insert {XSS} in the comment}
Bypass filter annotator matching
7. Cause of the vulnerability: STYLE labels are allowed. Over-trust annotator can be used to test the annotator
Tool: AppScanSite: www.talk915.comBrowser: Ie8,firefoxMethod: Insert Since the browser matches the content of the address in a regular fashion, it can only be traded in one way, instead of being executed directly, by injecting a hyperlink tag. And this hyperlink tag can entice the user to click.Because the XSS attack script is also based on HTML tags. and the label where the Searchwherevalue= ""/>Because the input content is actually in value. For ex
%61%76%61%73%63%72%69%70%74%3aOr #x6a #x61 #x76 #x61 #x73 #x63 #x72 #x69 #x70 #x74 #x3aOr #x006a #x0061 #x0076 #x0061 #x0073 #x0063 #x0072 #x0069 #x0070 #x0074 #x003aInput the above URL into the address bar, the response of each browserIE8:FirefoxDoes not make any prompts and does not perform the specified action.And the reason for this phenomenon is thathttp://hi.baidu.com/yushangren/item/ed6702819ccdb02b100ef38dThat is to say, IE8 and Firefox all make a regular match to the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.