当前位置: 首页 > news >正文

XSS 漏洞练习靶场,覆盖反射型、存储型、DOM 型、SVG、CSP、框架注入、协议绕过等多种场景

工具介绍

XSS-Sec 靶场项目是一个以“实战为导向”的 XSS 漏洞练习靶场,覆盖反射型、存储型、DOM 型、SVG、CSP、框架注入、协议绕过等多种场景。页面样式统一,逻辑清晰,适合系统化学习与教学演示。

关卡总览(名称与简介)

  • Level 1: Reflected XSS — The basics.

  • Level 2: DOM-based XSS — Client-side manipulation.

  • Level 3: Stored XSS — Persistent payloads.

  • Level 4: Attribute Breakout — Escape the attribute.

  • Level 5: Filter Bypass — No allowed.

  • Level 6: Quote Filtering — Break out of single quotes.

  • Level 7: Keyword Removal — Double write bypass.

  • Level 8: Encoding Bypass — HTML entities are your friend.

  • Level 9: URL Validation — Must contain http://

  • Level 10: Protocol Bypass — Case sensitivity matters.

  • Level 11: JS Context — Break out of JS string.

  • Level 12: DOM XSS via Hash — The server sees nothing.

  • Level 13: Frontend Filter — Bypass the regex.

  • Level 14: Double Encoding — Double the trouble.

  • Level 15: Framework Injection — AngularJS Template Injection.

  • Level 16: PostMessage XSS — Talk to the parent.

  • Level 17: CSP Bypass — Strict CSP? Find a gadget.

  • Level 18: Anchor Href XSS — Stored XSS in href.

  • Level 19: DOM XSS in Select — Break out of select.

  • Level 20: jQuery Anchor XSS — DOM XSS in jQuery attr().

  • Level 21: JS String Reflection — Reflected XSS in JS string.

  • Level 22: Reflected DOM XSS — Server reflection + Client sink.

  • Level 23: Stored DOM XSS — Replace only once.

  • Level 24: WAF Bypass (Tags/Attrs) — Reflected XSS with strict WAF.

  • Level 25: SVG Animate XSS — SVG-specific vector bypass.

  • Level 26: Canonical Link XSS — Escaping single quotes issue.

  • Level 27: Stored XSS in onclick — Entities vs escaping pitfall.

  • Level 28: Template Literal XSS — Reflected into JS template string.

  • Level 29: Cookie Exfiltration — Stored XSS steals session cookie.

  • Level 30: Angular Sandbox Escape — No strings, escape Angular sandbox.

  • Level 31: AngularJS CSP Escape — Bypass CSP and escape Angular sandbox.

  • Level 32: Reflected XSS (href/events blocked) — Bypass via SVG animate to set href.

  • Level 33: JS URL XSS (chars blocked) — Reflected XSS in javascript: URL with chars blocked.

  • Level 34: CSP Bypass (report-uri token) — Chrome-only CSP directive injection via report-uri.

  • Level 35: Upload Path URL XSS — Independent lab: upload HTML, random rename, URL concat XSS.

  • Level 36: Hidden Adurl Reflected XSS — Independent lab: hidden ad anchor reflects adurl/adid.

  • Level 37: Data URL Base64 XSS — Blacklist filter; must use data:text/html;base64 in object.

  • Level 38: PDF Upload XSS — Independent lab: upload PDF, view opens HTML-in-PDF causing XSS.

  • Level 39: Regex WAF Bypass — src/=“data:…” bypasses WAF regex.

  • Level 40: Bracket String Bypass — href reflects; use window[“al”+“ert”] to evade WAF.

  • Level 41: Fragment Eval/Window Bypass — Echo HTML; split strings then eval or window[a+b].

  • Level 42: Login DB Error XSS — Independent lab: invalid DB shows error, SQL reflects username.

  • Level 43: Chat Agent Link XSS — Independent lab: chat echoes, agent clicks user link executes.

  • Level 44: CSS Animation Event XSS — Strong WAF: only @keyframes+xss onanimationend allowed.

  • Level 45: RCDATA Textarea Breakout XSS — Strong WAF: only textarea/title RCDATA breakout works.

  • Level 46: JS String Escape (eval) — theme string injection; escape with eval(myUndefVar); alert(1);

  • Level 47: Throw onerror comma XSS — Strong WAF: only throw οnerrοr=alert,cookie

  • Level 48: Symbol.hasInstance Bypass — Strong WAF: only instanceof+eval chain

  • Level 49: Video Source onerror XSS — Strong WAF: only video source onerror

  • Level 50: Bootstrap RealSite XSS — Independent site: only xss onanimationstart

工具下载

https://github.com/duckpigdog/XSS-Sec
http://www.jsqmd.com/news/263771/

相关文章:

  • 费雪的行业领导者理论:寻找市场冠军
  • IP反查工具,能够快速查询指定IP/域名关联的所有网站
  • 详细介绍:【杂谈】-边缘计算竞赛:人工智能硬件缘何超越云端
  • 学长亲荐10个AI论文写作软件,MBA论文轻松搞定!
  • java求职学习day49
  • ubuntu 实现远程登录
  • 挖掘 0-Day 漏洞:AFL++ 模糊测试实战,给开源图像库 (libpng) 找一个致命 Crash
  • 布隆过滤器进阶:布谷鸟过滤器 (Cuckoo Filter) 是如何支持“删除”操作的?
  • Codeforces Round 1073 Div1 + Div2 部分题目题解
  • web入门111-120
  • 第 485 场周赛Q1——3813. 元音辅音得分
  • 恶意代码分析:在沙箱中运行勒索病毒,用 IDA Pro 逆向它的加密逻辑
  • 导师严选2026 AI论文网站TOP8:继续教育写作全攻略
  • LLM 推理加速:深入 vLLM 源码,揭秘 PagedAttention 如何让吞吐量提升 20 倍?
  • 完整教程:【Go/Python/Java】基础语法+核心特性对比
  • 数据交易中的数据质量评估方法
  • 数据结构3.0 栈、队列和数组
  • 算子优化实战:手写 Triton Kernel,将 LayerNorm 算子的执行时间压缩 50%
  • 深度测评自考必备一键生成论文工具TOP8
  • Linux实操篇
  • 51单片机智能遮阳篷窗户帘衣架蓝牙APP光雨滴检测41(设计源文件+万字报告+讲解)(支持资料、图片参考_相关定制)_文章底部可以扫码
  • Java 并发探秘:JCTools 源码剖析,为什么 Netty 放弃 JDK 自带队列而选择 MpscArrayQueue?
  • todo
  • Go 调度器 (GMP) 揭秘:从汇编角度看 Goroutine 是如何实现“协程切换”的?
  • 【创新未发表】基于matlab鸡群算法CSO和自适应双种群协同鸡群算法ADPCCSO无人机避障三维航迹规划【含Matlab源码 14980期】
  • 第 174 场双周赛Q2——3810. 变成目标数组的最少操作次数
  • 【无人机三维路径规划】基于matlab鸡群算法CSO和自适应双种群协同鸡群算法ADPCCSO复杂山地模型下无人机路径规划【含Matlab源码 14981期】
  • Day22-20260118
  • 强烈安利9个AI论文写作软件,专科生搞定毕业论文!
  • 【雷达跟踪】基于matlab面向目标跟踪的雷达干扰方法:提升航空器战场生存力的关键技术【含Matlab源码 14983期】复现含文献