XSS Challenge(1)

XSS Challenges

http://xss-quiz.int21h.jp/

 

Stage #1

 

Inject alert (document.domain), what input will return after the first try;

Back in the label, try to enter the direct payload;

 

 

Stage #2

 

Test returned;

 

Can be found, Test return value attribute, the attribute value close attention to double quotes;

 

 

 

Stage #3

 

Return test case;

 

By observing the total POST source we can find two parameters, p1 and p2, p1 found by testing to be filtered, so a burp modified value p2;

 

 

Stage #4

 

First test returns;

Found a hidden parameter p3, try to inject payload;

 

Found p3 is returned in the attribute value, the re-POST parameters p3, attention can be closed double quotes;

 

 

Stage #5

 

 

 

View source found on the length of the input have been restricted;

Parameters can be transmitted directly by Burp;

 

Stage #6

 

First test case of return;

 

Returns the value found in the properties, attention is closed;

Found not successful, view the source code and found that <,> is encoded, so we can not close the tab, then the input tag if there is any property can take advantage of it?

 

These are in the form of property, where the election onselect we try to inject;

Injection of success, when we select the form, it will trigger the payload;

 

 

Stage #7

 

Test returns;

 

Returns the value found in the attribute, try to inject;

 

Find quotes are filtered, but the value of the property itself without the quotation marks, then we can not quote;

 

 

 

Stage #8

 

Test returned;

 

Discovery has returned a <a href> </a> labels directly try to inject payload;

 

click the link;

 

 

Stage #9

 

Test returns;

 

It may be noted there are two parameters, one of which is p1, the return value in the value, the tested quotes, <,>, etc. are filtered, charset another parameter, value euc-jp, you can see a Japanese coding, coding and this question should be relevant;

I want to for a long time and do not know, go and see this question prompts;

 

UTF-7 is to use the original encoding;

 

 

Stage #10

 

Hint: Tips means should be put domain being filtered;

You can try to write double bypass, where the first test returns;

 

返回在value里,注意闭合双引号;

 

 

 

Stage #11

 

Hint:过滤了script,on开头的和style;

经测试结果返回在value属性中;

 

由于过滤规则是将带on的词变成onxxx,所以双写没法绕过;

在script当中加tab绕过;

 

 

Stage #12

 

Hint:x00、x20、<、>、”、’等均被过滤;

因为返回值在value中,所以必须要先闭合引号才有用,然而现在双引号和单引号均被过滤,经过我花了很长时间的搜索,发现`在IE中可以充当引号的作用!

 

(未完待续~)

Guess you like

Origin www.cnblogs.com/Dio-Hch/p/12103340.html
xss