news 2026/5/13 18:53:26

XSS 漏洞练习靶场,覆盖反射型、存储型、DOM 型、SVG、CSP、框架注入、协议绕过等多种场景

作者头像

张小明

前端开发工程师

1.2k 24
文章封面图
XSS 漏洞练习靶场,覆盖反射型、存储型、DOM 型、SVG、CSP、框架注入、协议绕过等多种场景

工具介绍

XSS-Sec 靶场项目是一个以“实战为导向”的 XSS 漏洞练习靶场,覆盖反射型、存储型、DOM 型、SVG、CSP、框架注入、协议绕过等多种场景。页面样式统一,逻辑清晰,适合系统化学习与教学演示。

关卡总览(名称与简介)

  • Level 1: Reflected XSS — The basics.

  • Level 2: DOM-based XSS — Client-side manipulation.

  • Level 3: Stored XSS — Persistent payloads.

  • Level 4: Attribute Breakout — Escape the attribute.

  • Level 5: Filter Bypass — No allowed.

  • Level 6: Quote Filtering — Break out of single quotes.

  • Level 7: Keyword Removal — Double write bypass.

  • Level 8: Encoding Bypass — HTML entities are your friend.

  • Level 9: URL Validation — Must contain http://

  • Level 10: Protocol Bypass — Case sensitivity matters.

  • Level 11: JS Context — Break out of JS string.

  • Level 12: DOM XSS via Hash — The server sees nothing.

  • Level 13: Frontend Filter — Bypass the regex.

  • Level 14: Double Encoding — Double the trouble.

  • Level 15: Framework Injection — AngularJS Template Injection.

  • Level 16: PostMessage XSS — Talk to the parent.

  • Level 17: CSP Bypass — Strict CSP? Find a gadget.

  • Level 18: Anchor Href XSS — Stored XSS in href.

  • Level 19: DOM XSS in Select — Break out of select.

  • Level 20: jQuery Anchor XSS — DOM XSS in jQuery attr().

  • Level 21: JS String Reflection — Reflected XSS in JS string.

  • Level 22: Reflected DOM XSS — Server reflection + Client sink.

  • Level 23: Stored DOM XSS — Replace only once.

  • Level 24: WAF Bypass (Tags/Attrs) — Reflected XSS with strict WAF.

  • Level 25: SVG Animate XSS — SVG-specific vector bypass.

  • Level 26: Canonical Link XSS — Escaping single quotes issue.

  • Level 27: Stored XSS in onclick — Entities vs escaping pitfall.

  • Level 28: Template Literal XSS — Reflected into JS template string.

  • Level 29: Cookie Exfiltration — Stored XSS steals session cookie.

  • Level 30: Angular Sandbox Escape — No strings, escape Angular sandbox.

  • Level 31: AngularJS CSP Escape — Bypass CSP and escape Angular sandbox.

  • Level 32: Reflected XSS (href/events blocked) — Bypass via SVG animate to set href.

  • Level 33: JS URL XSS (chars blocked) — Reflected XSS in javascript: URL with chars blocked.

  • Level 34: CSP Bypass (report-uri token) — Chrome-only CSP directive injection via report-uri.

  • Level 35: Upload Path URL XSS — Independent lab: upload HTML, random rename, URL concat XSS.

  • Level 36: Hidden Adurl Reflected XSS — Independent lab: hidden ad anchor reflects adurl/adid.

  • Level 37: Data URL Base64 XSS — Blacklist filter; must use data:text/html;base64 in object.

  • Level 38: PDF Upload XSS — Independent lab: upload PDF, view opens HTML-in-PDF causing XSS.

  • Level 39: Regex WAF Bypass — src/=“data:…” bypasses WAF regex.

  • Level 40: Bracket String Bypass — href reflects; use window[“al”+“ert”] to evade WAF.

  • Level 41: Fragment Eval/Window Bypass — Echo HTML; split strings then eval or window[a+b].

  • Level 42: Login DB Error XSS — Independent lab: invalid DB shows error, SQL reflects username.

  • Level 43: Chat Agent Link XSS — Independent lab: chat echoes, agent clicks user link executes.

  • Level 44: CSS Animation Event XSS — Strong WAF: only @keyframes+xss onanimationend allowed.

  • Level 45: RCDATA Textarea Breakout XSS — Strong WAF: only textarea/title RCDATA breakout works.

  • Level 46: JS String Escape (eval) — theme string injection; escape with eval(myUndefVar); alert(1);

  • Level 47: Throw onerror comma XSS — Strong WAF: only throw οnerrοr=alert,cookie

  • Level 48: Symbol.hasInstance Bypass — Strong WAF: only instanceof+eval chain

  • Level 49: Video Source onerror XSS — Strong WAF: only video source onerror

  • Level 50: Bootstrap RealSite XSS — Independent site: only xss onanimationstart

工具下载

https://github.com/duckpigdog/XSS-Sec
版权声明: 本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若内容造成侵权/违法违规/事实不符,请联系邮箱:809451989@qq.com进行投诉反馈,一经查实,立即删除!
网站建设 2026/5/9 19:32:53

51单片机智能遮阳篷窗户帘衣架蓝牙APP光雨滴检测41(设计源文件+万字报告+讲解)(支持资料、图片参考_相关定制)_文章底部可以扫码

51单片机智能遮阳篷窗户帘衣架蓝牙APP光雨滴检测41(设计源文件万字报告讲解)(支持资料、图片参考_相关定制)_文章底部可以扫码 产品功能描述: 本系统由STC89C52单片机、雨滴传感器、光照传感器、蓝牙模块、继电器、拨动开关及电源组成 1、可以…

作者头像 李华
网站建设 2026/5/13 2:04:02

企业内部模型上线前,必须补上的一项测试:执行态稳定性

一个现实问题很多企业在模型上线前,会测试:准确率延迟成本幻觉率但几乎不测试:执行态是否稳定为什么这是一个严重缺口因为事故往往不是:完全错误而是:执行态不一致上线前最小 Gate 清单(简化版)…

作者头像 李华
网站建设 2026/5/13 14:51:10

8B小模型后训练实战:企业私域语义空间稳定性与通用能力平衡指南

本文探讨8B小模型通过后训练在企业私域语义空间中的应用价值。实验表明,经过SFTDPO训练的模型能在不依赖system prompt/RAG的情况下稳定进入私域语义空间,同时保持通用知识与CoT能力。文章分享了三条实践经验:警惕"脑损伤"SFT、训练…

作者头像 李华
网站建设 2026/5/10 5:07:50

AI智能宠物管家系统:基于YOLOv5的宠物识别与行为分析解决方案

文章目录 毕设帮扶:从0到1搭建基于YOLOv5的宠物检测系统——助你搞定深度学习毕设 一、课题价值:宠物检测毕设为啥值得做? 二、核心技术:YOLOv5在宠物检测中的“硬实力” 三、任务拆解:你的系统要解决哪些宠物检测问题? (一)核心任务 (二)场景挑战与应对 四、数据集:…

作者头像 李华
网站建设 2026/5/10 15:20:34

Bug侦破大会:破解技术悬案的终极策略

技术悬案:Bug侦破大会的挑战与策略主题引入 从软件开发的日常中选取典型Bug案例,以悬疑叙事方式吸引读者,强调复杂Bug对项目的潜在影响。案例背景设定选择具有代表性的技术场景(如分布式系统、内存泄漏、并发问题)&…

作者头像 李华