|
5 `) S9 |% a" D) N% v5 ~<p>当网站过滤了大部分的HTML标签和属性,我们就尝试爆破一下,看哪些标签和属性没有没过滤。</p>! B* J! r, o7 j ]0 Y
<h2>爆破的步骤:</h2>) Z+ j* J6 l' ]* O5 V- D
<p> 1. 首先在测试点输入我们正常的exp,并抓包发送到Intruder模块。</p>
8 s X( }2 V X/ H! P: M, {5 _( `& W<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213553022-1529348382.png" ></p> a8 G- j. v7 y( e) R" m
<p> 2. 将exp改为 <§§> ,以创建有效载荷位置。</p>% s& H) E% Z/ L( Y- x3 B
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213706671-202348246.png" ></p>! u* S4 c% ]4 d# E1 [; n
<p> 3. 在xss备忘单中点击:Copy tags to clipboard,点击Paste粘贴到Intruder的payload位置。</p>, x1 y; v3 ` M4 M7 h
<p> https://portswigger.net/web-security/cross-site-scripting/cheat-sheet</p>; g# V$ _% ]2 Z
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213910208-9621953.png" ></p>- @0 P2 `* x, i$ t( t# w- d
<p> 4. 进行爆破。发现body标签没有被过滤。</p>; l* i, d( G+ W N5 J( i2 L
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214019819-944940889.png" ></p>( O1 H1 O+ Z: w3 w Y4 V( D1 Y
<p> 5. 将有效载荷设置为:<body%20§§=1></p>
o# n0 Q1 T* T3 d* {<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214230292-1546309510.png" ></p>
% G) m4 T) i. I ^4 t# {8 n<p> 6. 在xss备忘单中点击:将事件复制到粘贴板,点击Paste粘贴到Intruder的payload位置。</p>1 ~- z; v) H; v8 k! S7 G
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214535613-35221747.png" ></p>
9 ?0 q; s( u V( Y1 G8 a$ d, L+ U<p> 7. 进行攻击。发现onresize属性没有被过滤。</p>
# q0 i) Y3 E `! @; h: t<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211215313601-1834234454.png" ></p>
; N6 g- }5 q) I, K0 z( u<p> 8. 构造payload,在测试位置输入,并用F12打开调试窗口时,就会弹窗。</p>; H5 J P, j) E$ C
<p> 因为onresize属性就是窗口或框架被调整大小时触发。</p>: q9 A6 g+ D4 i8 Y
<div class="cnblogs_code">" R, k8 b6 h2 z! ~1 G
<pre><body onresize=alert(3)></pre>
! v$ Y; J, Q" U! [) e</div>
7 ^) ~# H+ v" z( B$ _/ a- x<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211220602121-1842422690.png" ></p>
, i; b1 a% j5 N7 ^<p> </p>' W Z6 M ~. s4 g5 f: k8 u
|
|