|
|
6 A9 u. C9 m* n: I- ]
<p>当网站过滤了大部分的HTML标签和属性,我们就尝试爆破一下,看哪些标签和属性没有没过滤。</p>
# f# r1 l2 J1 `) z<h2>爆破的步骤:</h2>
% H3 I! r8 U2 b* n( Q" l4 u# x<p> 1. 首先在测试点输入我们正常的exp,并抓包发送到Intruder模块。</p>
7 ?/ ~# ^4 z( F- S+ e, e<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213553022-1529348382.png" ></p>/ a% ~1 i5 v2 d) T) t0 {$ ~
<p> 2. 将exp改为 <§§> ,以创建有效载荷位置。</p>2 B0 ~0 C% u7 K: p
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213706671-202348246.png" ></p>4 J8 P7 s; ]4 Y8 B
<p> 3. 在xss备忘单中点击:Copy tags to clipboard,点击Paste粘贴到Intruder的payload位置。</p>
. L6 r, M0 M7 ^4 O<p> https://portswigger.net/web-security/cross-site-scripting/cheat-sheet</p>
5 g3 e- M) e3 R! U<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213910208-9621953.png" ></p>, f( e7 ~- k8 G6 D
<p> 4. 进行爆破。发现body标签没有被过滤。</p>
7 q' M- z6 T* H3 l$ Q<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214019819-944940889.png" ></p>0 E$ r- ?* V* o2 I _2 x
<p> 5. 将有效载荷设置为:<body%20§§=1></p>
0 S0 J, y( [ D5 e<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214230292-1546309510.png" ></p>1 r9 k0 u9 I- T' v1 @% s
<p> 6. 在xss备忘单中点击:将事件复制到粘贴板,点击Paste粘贴到Intruder的payload位置。</p> V; P" c, H: R, p- q5 L
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214535613-35221747.png" ></p>/ N8 T0 B* S8 _6 p( l# W9 s, k& ], Z
<p> 7. 进行攻击。发现onresize属性没有被过滤。</p>
3 }: r) J( R0 }% A! I ?<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211215313601-1834234454.png" ></p>
+ C! J/ ]0 f* o8 k: f9 I2 R5 N" T<p> 8. 构造payload,在测试位置输入,并用F12打开调试窗口时,就会弹窗。</p>
/ I$ C" O. J8 n6 l6 C; e& e; k<p> 因为onresize属性就是窗口或框架被调整大小时触发。</p>
1 h3 f D) ?8 Z/ Q. t* H9 ^6 B! Z- w<div class="cnblogs_code">1 a# t r' P, h# P; s* `
<pre><body onresize=alert(3)></pre>; e& d7 ] i' ^) d6 k% N
</div>* ?6 ^. k+ S3 X. F+ k' q0 P
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211220602121-1842422690.png" ></p>
5 F- [! {- r5 p+ ]1 D. q/ W5 C# t<p> </p>
c m, Y g% d) [; d |
|