I believe everyone has had this experience when conducting penetration tests. It is clear that there is an XSS vulnerability, but there are XSS filtering rules or WAF protection, which makes us unable to use it successfully, for example, if we enter
1. Bypass magic_quotes_gpc
Magic_quotes_gpc = ON is the security setting in php. After it is enabled, some special characters will be rotated, for example, '(s
.
The attack power depends on the script entered by the user.
Of course, the data submitted by the user can also be sent to the server through QueryString (in the URL) and Cookie. For example
HTML Encode
XSS occurs because the data entered by the user is changed to code. Therefore, we need to perform HTML Encode processing on user input data. Encode special characters such as "brackets", "single quotes", and "quotation marks.
A ready-made method is
=" alert (document.cookie), then it becomes
The embedded JavaScript code will be executed when the event is triggered
The power of the attack depends on what kind of script the user has entered
Of course, the data submitted by the user can also be sent to the server via QueryString (placed in the URL) and cookies. For example, the following figure
HTML Encode
XSS occurs because the data entered by the user becomes code. So we need to do HTML
=" alert (document.cookie), then it becomes
The embedded JavaScript code will be executed when the event is triggered.
The power of the attack depends on what kind of script the user has entered
Of course, user-submitted data can also be sent to the server via QueryString (placed in a URL) and cookies. For example, the following figure
HTML Encode
The reason that XSS occurs is because the data entered by the user becomes code. So we need to do HTM
the script entered by the user.Of course, the data submitted by the user can also be sent to the server through QueryString (in the URL) and Cookie. For exampleHTML EncodeXSS occurs because the data entered by the user is changed to code. Therefore, we need to perform HTML Encode processing on user input data. Encode special characters such as "brackets", "single quotes", and "quotation marks.A ready-made method is provided in C #. You only need to call HttpUtility. HtmlEncode ("string Fiddler
enters "onfocus=" alert (document.cookie), then it becomesThe embedded JavaScript code will be executed when the event is triggered.The power of the attack depends on what kind of script the user has enteredOf course, user-submitted data can also be sent to the server via QueryString (placed in a URL) and cookies. For exampleHTML EncodeThe reason that XSS occurs is because the data entered by the user becomes code. So we need to do HTML encode proces
Transferred from: http://www.uml.org.cn/Test/201407161.aspXSS vulnerability testing of Web applications cannot be limited to entering XSS attack fields on Web pages and submitting them. Bypassing JavaScript detection, entering an XSS script, usually ignored by the tester. The attack path that bypasses JavaScript detection for
(document. cookie) and script
The embedded JavaScript code will be executed.
Or if the user inputs "onfocus =" alert (document. cookie ),
When an event is triggered, the embedded JavaScript code is executed.
The attack power depends on the script entered by the user.
Of course, the data submitted by the user can also be sent to the server through QueryString (in the URL) and Cookie. for example
HTML Encode
XSS occurs because the data entered
work.
">
This would end the previous opened tag and open our script tag.Example:
hxxp://vulnerable-site/search?q= ">
Conclusion:From above article, it's clear that XSS filters alone not going to protect a site from the XSS attacks. If you really want to make your site more secure, then ask Pentesters to test your application or test yourself.Also There is lot of the different filter
Page Test with input boxFor non-Rich Text, enter special characters in the input box On the submitted page, check the source code. Based on the keyword tiehua, check whether the Rich text input boxIf the page is submitted due to typographical issues or js errors, it indicates that the input box has the xss Vulnerability (a bug is reported ).Test Page Link ParametersLinks with parameters such:Http://mall.taobao.com /? Ad_id = am_id = cm_id = pm_id =
Author: CnCxzSecBlog: http://hi.baidu.com/cncxzThis method is not new, but it is rarely used or desirable.Data: similar to javascript:. To a large extent, javascript work can be completed.For example:During the XSS test, it was found that keywords such as javascript and script were filtered out (currently, XSS-aware administrators generally know how to filter these two keywords ). The following statements a
Use the XSS SessionIE php script. What I wrote is purely fun and boring. In the end, it is just an xml operation. The reason is that www.cncert.net released a new xs in our mail list a few days ago. what I wrote was purely fun and boring. In the end, it was just an xml operation. The reason is still due to a few days ago, http://www.cncert.net released a new xss utility in our mail list, similar to the hams
I write this is purely fun, no meaning, in the end is the operation of XML. The origin is still due to a few days ago Http://www.cncert.net in our mailing list released a new XSS utilization tool, similar to the foreigner's hamster, in the client timed refresh to keep session does not time out. Once accessed by a cross-site person, the attacker can remain logged on. This
I sorted out a small tool class from Lao Zhao, a small tool class for testing, and a tool class from Lao Zhao.
I sorted out a test tool class from Lao Zhao without changing anything else. I just changed the class name and method name to a name that I prefer.
The Code is as f
Simple use of automated Unit Testing Tool EvoSuite and unit testing evosuite1. Introduction to EvoSuite
EvoSuite is an open-source tool jointly developed by Sheffield and other universities. It is used to automatically generate test case sets. All generated test cases comply with Junit standards and can be run directly
Use Apache AB tool for stress testing and apache stress testing
AB command PrincipleThe Apache AB command simulates multi-thread concurrent requests, tests server load pressure, and tests the pressure on other Web servers such as nginx, lighthttp, and IIS.The AB tool that comes with Apache is very easy to use (the PHP
Rotten mud: Application of apache Performance Testing Tool AB and apache Performance Testing
This article was sponsored by Xiuyi linfeng and first launched in the dark world.
Website performance stress testing is an essential part of the performance tuning process for servers. Only when the server is under high pressu
Networkcomms v3 stress testing program-microftp server (EXE program, not open source), server stress testing tool
This program is not open-sourceOnly EXE files are provided to help you understand the NetworkCommsV3 framework.
EXE file
Some resources of this program come from the CS programmer's window. Thank you very much.
In my work environment, the deployed net
There are a lot of performance tools on the Linux platform, a dazzling, long-term groping and experience finding the best thing to use is the proven, simple gadgets. Brendan D. Gregg, a system performance expert, updated his famous talk (Linux performance Tools) and slides on Linux in the recent LinuxCon NA 2014 conference. Compared with Brendan last year's talk, this year added testing and optimization to the two parts. The three images below summari
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.