XSS攻击汇总 做网站安全的朋友需要注意下
(1)普通的XSS JavaScript注入
(2)IMG标签XSS使用JavaScript命令
(3)IMG标签无分号无引号
%20
(4)IMG标签大小写不敏感%20
%20
(5)HTML编码(必须有分号)%20
%20
(6)修正缺陷IMG标签%20
https://www.jb51.net/hack/”>%20
(7)formCharCode标签(计算器)%20
%20
(8)UTF-8的Unicode编码(计算器)%20
%20
(9)7位的UTF-8的Unicode编码是没有分号的(计算器)%20
%20
(10)十六进制编码也是没有分号(计算器)%20
%20
(11)嵌入式标签,将Javascript分开%20
%20
(12)嵌入式编码标签,将Javascript分开%20
%20
(13)嵌入式换行符%20
%20
(14)嵌入式回车%20
%20
(15)嵌入式多行注入JavaScript,这是XSS极端的例子%20
%20
(16)解决限制字符(要求同页面)%20
%20
%20
%20
%20
%20
%20
%20
%20
%20
%20
(17)空字符12-7-1%20T00LS%20-%20Powered%20by%20Discuz!%20Board%20
https://www.t00ls.net/viewthread.php?action=printable&tid=15267%202/6%20
perl%20-e%20‘print%20“![]()
(2)IMG标签XSS使用JavaScript命令
(3)IMG标签无分号无引号
(4)IMG标签大小写不敏感%20
(5)HTML编码(必须有分号)%20
(6)修正缺陷IMG标签%20
(7)formCharCode标签(计算器)%20
(8)UTF-8的Unicode编码(计算器)%20
(9)7位的UTF-8的Unicode编码是没有分号的(计算器)%20
(10)十六进制编码也是没有分号(计算器)%20
(11)嵌入式标签,将Javascript分开%20
(12)嵌入式编码标签,将Javascript分开%20
(13)嵌入式换行符%20
(14)嵌入式回车%20
(15)嵌入式多行注入JavaScript,这是XSS极端的例子%20
(16)解决限制字符(要求同页面)%20
%20
%20
%20
%20
%20
%20
%20
%20
%20
%20
(17)空字符12-7-1%20T00LS%20-%20Powered%20by%20Discuz!%20Board%20
https://www.t00ls.net/viewthread.php?action=printable&tid=15267%202/6%20
perl%20-e%20‘print%20“
