|
|
6 k- c' Q# r" C, E+ [4 O/ d0 w# t
<p>当网站过滤了大部分的HTML标签和属性,我们就尝试爆破一下,看哪些标签和属性没有没过滤。</p>
2 f W, ]! e: k0 o# w<h2>爆破的步骤:</h2>
' q/ ~/ v" i" J" j/ t! n<p> 1. 首先在测试点输入我们正常的exp,并抓包发送到Intruder模块。</p>* ]6 d# u( \) ?
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213553022-1529348382.png" ></p>
" q) Q9 U- L8 X6 p2 V" R* @0 u<p> 2. 将exp改为 <§§> ,以创建有效载荷位置。</p>% W. Y: |3 H* |' \4 p; Q" Y0 G
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213706671-202348246.png" ></p>
. ]* M @ ?2 y<p> 3. 在xss备忘单中点击:Copy tags to clipboard,点击Paste粘贴到Intruder的payload位置。</p>
7 u* D& `+ U& \<p> https://portswigger.net/web-security/cross-site-scripting/cheat-sheet</p>
% `# B5 P/ @, q/ l: ~<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213910208-9621953.png" ></p>
: v" k& D4 @, q _/ R, E<p> 4. 进行爆破。发现body标签没有被过滤。</p>: Y, j- Z8 e# ^9 E% i
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214019819-944940889.png" ></p>
0 F9 ? l- ]4 H+ `* `<p> 5. 将有效载荷设置为:<body%20§§=1></p> O, [* t9 a ?1 B4 n
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214230292-1546309510.png" ></p># N M6 l9 a4 |& Z
<p> 6. 在xss备忘单中点击:将事件复制到粘贴板,点击Paste粘贴到Intruder的payload位置。</p>
' c3 K, T+ h; Q- E<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214535613-35221747.png" ></p>
) N9 a2 j) y1 N% V<p> 7. 进行攻击。发现onresize属性没有被过滤。</p>" v7 B, u8 t- Q g+ r
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211215313601-1834234454.png" ></p>
0 x' I/ H2 a% J! R<p> 8. 构造payload,在测试位置输入,并用F12打开调试窗口时,就会弹窗。</p>
1 R: u# V2 m1 N<p> 因为onresize属性就是窗口或框架被调整大小时触发。</p>
1 K9 ?3 L; d6 r& F<div class="cnblogs_code">
5 B# k; }+ x- V# E U( m. d# t<pre><body onresize=alert(3)></pre>. b ^9 _* K% j7 w, j2 \& X& Q4 _
</div>
, L! T* H- H" L, ^* t<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211220602121-1842422690.png" ></p>
5 O& e5 O: `1 }4 O5 N. W/ |<p> </p>& A- \( p. u" z+ ^2 v- ]
|
|