|
' J; [0 M+ [) p<p>当网站过滤了大部分的HTML标签和属性,我们就尝试爆破一下,看哪些标签和属性没有没过滤。</p>
( q& ]7 m0 Q0 w0 k1 ~<h2>爆破的步骤:</h2>
4 Y. s$ M9 p" i2 X4 y7 k# z/ Q<p> 1. 首先在测试点输入我们正常的exp,并抓包发送到Intruder模块。</p>
# g0 r$ p7 ^- N5 }3 i/ f+ w0 S<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213553022-1529348382.png" ></p>' u1 _9 M6 @! g3 {' p( H# V
<p> 2. 将exp改为 <§§> ,以创建有效载荷位置。</p>) v% x- Q R9 l3 f) m" T- I6 K, g
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213706671-202348246.png" ></p>
, |& E* J4 T/ L1 {/ W2 g) Y2 U a<p> 3. 在xss备忘单中点击:Copy tags to clipboard,点击Paste粘贴到Intruder的payload位置。</p>5 t9 v u- t# Y2 | }2 Q. n
<p> https://portswigger.net/web-security/cross-site-scripting/cheat-sheet</p>6 h" q0 U: \- |; _# P1 s
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211213910208-9621953.png" ></p>1 r/ z' ~' F6 l! d9 |; j
<p> 4. 进行爆破。发现body标签没有被过滤。</p>
- P5 T% B& q- g( m. L4 f" t. S<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214019819-944940889.png" ></p>$ a9 C, u7 o v3 s3 w6 x. q( z
<p> 5. 将有效载荷设置为:<body%20§§=1></p>
" `- R; ]3 G; W4 o, @" L0 ^2 G4 J5 c' H2 H<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214230292-1546309510.png" ></p>
' C6 E1 [# X* H9 E5 b) `% a; M" l<p> 6. 在xss备忘单中点击:将事件复制到粘贴板,点击Paste粘贴到Intruder的payload位置。</p>
9 S# Q* ]7 M6 U<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211214535613-35221747.png" ></p>2 t5 [4 C$ z8 M2 F9 d
<p> 7. 进行攻击。发现onresize属性没有被过滤。</p>
; a( ?# e( D+ x. r. d: j5 Y, x% x<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211215313601-1834234454.png" ></p>
% p# ~" u! {% \! V* C<p> 8. 构造payload,在测试位置输入,并用F12打开调试窗口时,就会弹窗。</p>
. t4 b2 ^; \2 y% F, i( ~5 Y<p> 因为onresize属性就是窗口或框架被调整大小时触发。</p>
4 c J, @ J8 h<div class="cnblogs_code">" m6 T1 b& c! g l+ L9 s% X) R/ I2 a
<pre><body onresize=alert(3)></pre>
! l R2 @- N' O# _6 U, Q: R: u6 S</div>$ l7 K( O- M$ C7 y
<p><img src="https://img2022.cnblogs.com/blog/2742124/202202/2742124-20220211220602121-1842422690.png" ></p>/ S( z3 f, x/ H3 f5 T/ }9 _0 d
<p> </p>
' m* D& ]. i+ i0 R% n |
|