├── back-end ├── CSRF │ ├── manage │ │ ├── Dockerfile │ │ ├── style.css │ │ ├── index.html │ │ ├── addAdminUser.php │ │ ├── main.php │ │ ├── login.php │ │ └── utils.php │ ├── mysql │ │ ├── Dockerfile │ │ └── sql-scripts │ │ │ ├── InsertData.sql │ │ │ └── CreateTable.sql │ ├── variables.env │ ├── hacker_web │ │ ├── iframe.html │ │ └── index.html │ ├── README.md │ └── docker-compose.yml ├── JSON Hijacking │ ├── web │ │ ├── Dockerfile │ │ ├── json.php │ │ ├── style.css │ │ ├── index.html │ │ ├── main.php │ │ ├── login.php │ │ └── utils.php │ ├── mysql │ │ ├── Dockerfile │ │ └── sql-scripts │ │ │ ├── CreateTable.sql │ │ │ └── InsertData.sql │ ├── variables.env │ ├── hacker_web │ │ ├── record_info.php │ │ └── index.html │ ├── README.md │ └── docker-compose.yml ├── XSS │ ├── persistent │ │ ├── server │ │ │ ├── Dockerfile │ │ │ ├── getContent.php │ │ │ └── postContent.php │ │ ├── mysql │ │ │ ├── sql-scripts │ │ │ │ ├── InsertData.sql │ │ │ │ └── CreateTable.sql │ │ │ └── Dockerfile │ │ ├── variables.env │ │ ├── client │ │ │ ├── style.css │ │ │ ├── index.html │ │ │ ├── js.js │ │ │ └── jquery-3.4.1.min.js │ │ ├── README.md │ │ └── docker-compose.yml │ └── non-persistent │ │ ├── docker-compose.yml │ │ ├── README.md │ │ └── src │ │ └── index.php └── SSRF │ ├── outer_web │ ├── style.css │ ├── index.js │ └── index.php │ ├── inner_web │ └── index.html │ ├── docker-compose.yml │ └── README.md ├── front-end └── XSS │ └── DOM-XSS │ ├── docker-compose.yml │ ├── README.md │ └── src │ └── index.html └── README.md /back-end/CSRF/manage/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM php:7.2-apache 2 | 3 | RUN docker-php-ext-install mysqli -------------------------------------------------------------------------------- /back-end/JSON Hijacking/web/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM php:7.2-apache 2 | 3 | RUN docker-php-ext-install mysqli -------------------------------------------------------------------------------- /back-end/XSS/persistent/server/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM php:7.2-apache 2 | 3 | RUN docker-php-ext-install mysqli -------------------------------------------------------------------------------- /back-end/CSRF/mysql/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM mysql:5.7 2 | 3 | COPY ./sql-scripts/ /docker-entrypoint-initdb.d/ 4 | 5 | EXPOSE 3306 -------------------------------------------------------------------------------- /back-end/CSRF/mysql/sql-scripts/InsertData.sql: -------------------------------------------------------------------------------- 1 | INSERT INTO csrf.admin (username, password) VALUES ('root', md5('000000')); -------------------------------------------------------------------------------- /back-end/CSRF/variables.env: -------------------------------------------------------------------------------- 1 | MYSQL_USER=csrf 2 | MYSQL_PASSWORD=toor 3 | MYSQL_RANDOM_ROOT_PASSWORD=yes 4 | MYSQL_DATABASE=csrf -------------------------------------------------------------------------------- /back-end/XSS/persistent/mysql/sql-scripts/InsertData.sql: -------------------------------------------------------------------------------- 1 | INSERT INTO xss.message (content, ip) VALUES ('我是第一条评论', '127.0.0.1'); -------------------------------------------------------------------------------- /back-end/CSRF/mysql/sql-scripts/CreateTable.sql: -------------------------------------------------------------------------------- 1 | CREATE TABLE admin ( 2 | username varchar(30), 3 | password varchar(35) 4 | ); -------------------------------------------------------------------------------- /back-end/JSON Hijacking/mysql/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM mysql:5.7 2 | 3 | COPY ./sql-scripts/ /docker-entrypoint-initdb.d/ 4 | 5 | EXPOSE 3306 -------------------------------------------------------------------------------- /back-end/XSS/persistent/mysql/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM mysql:5.7 2 | 3 | COPY ./sql-scripts/ /docker-entrypoint-initdb.d/ 4 | 5 | EXPOSE 3306 -------------------------------------------------------------------------------- /back-end/XSS/persistent/variables.env: -------------------------------------------------------------------------------- 1 | MYSQL_USER=xss 2 | MYSQL_PASSWORD=toor 3 | MYSQL_RANDOM_ROOT_PASSWORD=yes 4 | MYSQL_DATABASE=xss -------------------------------------------------------------------------------- /back-end/XSS/persistent/mysql/sql-scripts/CreateTable.sql: -------------------------------------------------------------------------------- 1 | CREATE TABLE message ( 2 | content varchar(255), 3 | ip varchar(100) 4 | ); -------------------------------------------------------------------------------- /back-end/JSON Hijacking/variables.env: -------------------------------------------------------------------------------- 1 | MYSQL_USER=json_hijacking 2 | MYSQL_PASSWORD=toor 3 | MYSQL_RANDOM_ROOT_PASSWORD=yes 4 | MYSQL_DATABASE=json_hijacking -------------------------------------------------------------------------------- /back-end/JSON Hijacking/mysql/sql-scripts/CreateTable.sql: -------------------------------------------------------------------------------- 1 | CREATE TABLE user ( 2 | username varchar(30), 3 | password varchar(35), 4 | balance int(10) 5 | ); -------------------------------------------------------------------------------- /back-end/JSON Hijacking/mysql/sql-scripts/InsertData.sql: -------------------------------------------------------------------------------- 1 | INSERT INTO json_hijacking.user (username, password, balance) VALUES ('Black-Hole', md5('000000'), 2000), ('william', md5('000000'), 3000); -------------------------------------------------------------------------------- /back-end/SSRF/outer_web/style.css: -------------------------------------------------------------------------------- 1 | input { 2 | width: 300; 3 | } 4 | 5 | button { 6 | margin-bottom: 10px; 7 | } 8 | 9 | textarea { 10 | display: block; 11 | width: 800px; 12 | height: 700px; 13 | } -------------------------------------------------------------------------------- /back-end/JSON Hijacking/hacker_web/record_info.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /back-end/SSRF/outer_web/index.js: -------------------------------------------------------------------------------- 1 | // 根据url动态拼接url 2 | function seeCode() { 3 | const url = document.getElementsByTagName('input')[0].value; 4 | location.href = location.origin + location.pathname + '?url=' + url 5 | } -------------------------------------------------------------------------------- /front-end/XSS/DOM-XSS/docker-compose.yml: -------------------------------------------------------------------------------- 1 | version: '3' 2 | services: 3 | web: 4 | image: httpd:2.4 5 | container_name: front-end-xss-dom-xss 6 | ports: 7 | - "8081:80" 8 | volumes: 9 | - ./src:/usr/local/apache2/htdocs/ -------------------------------------------------------------------------------- /back-end/XSS/non-persistent/docker-compose.yml: -------------------------------------------------------------------------------- 1 | version: '3' 2 | services: 3 | web: 4 | image: php:7.2-apache 5 | container_name: back-end-xss-non-persistent 6 | ports: 7 | - "8082:80" 8 | volumes: 9 | - ./src:/var/www/html/ -------------------------------------------------------------------------------- /back-end/SSRF/inner_web/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | SSRF - 内网海洋中的一只网站 5 | 6 | 7 |

我是存在于内网的一只小可爱

8 | 小提示:外网是访问不了我的哦 9 | 10 | -------------------------------------------------------------------------------- /front-end/XSS/DOM-XSS/README.md: -------------------------------------------------------------------------------- 1 | ### DOM XSS 2 | 3 | 启动命令: 4 | 5 | ```shell 6 | cd ./front-end/XSS/DOM-XSS 7 | docker-compose up --force-recreate 8 | ``` 9 | 10 | 打开浏览器,访问: [http://127.0.0.1:8081](http://127.0.0.1:8081) 11 | 12 | 尝试把url改为下面这样: 13 | * `http://127.0.0.1:8081/#javascript:alert(1)` 14 | -------------------------------------------------------------------------------- /back-end/XSS/non-persistent/README.md: -------------------------------------------------------------------------------- 1 | ### 反射型XSS 2 | 3 | 启动命令: 4 | 5 | ```shell 6 | cd ./back-end/XSS/non-persistent 7 | docker-compose up --force-recreate 8 | ``` 9 | 10 | 打开浏览器,访问: [http://127.0.0.1:8082](http://127.0.0.1:8082) 11 | 12 | 尝试把url改为下面这样: 13 | * `http://127.0.0.1:8082/?bg=123' onclick='alert(1)` 14 | -------------------------------------------------------------------------------- /back-end/CSRF/hacker_web/iframe.html: -------------------------------------------------------------------------------- 1 |
2 | 3 | 4 | 5 |
6 | 7 | -------------------------------------------------------------------------------- /back-end/JSON Hijacking/web/json.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /back-end/XSS/persistent/client/style.css: -------------------------------------------------------------------------------- 1 | .message-item { 2 | border-bottom: 1px solid black; 3 | } 4 | 5 | .message-item:last-child { 6 | margin-bottom: 40px; 7 | } 8 | 9 | .message-item:not(:first-child) { 10 | margin-top: 20px; 11 | } 12 | 13 | .message-item > .content { 14 | display: block; 15 | } 16 | 17 | textarea { 18 | display: block; 19 | width: 300px; 20 | height: 100px; 21 | } -------------------------------------------------------------------------------- /back-end/CSRF/hacker_web/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | CSRF - Hacked! 5 | 6 | 7 |

当你打开这个网站的时候,就说明你已经被攻击了。

8 | 9 | 去尝试 http://127.0.0.1:8086/ 里使用账号: test 密码: 123 登陆吧 10 | 11 | -------------------------------------------------------------------------------- /back-end/JSON Hijacking/README.md: -------------------------------------------------------------------------------- 1 | ### CSRF 2 | 3 | 启动命令: 4 | 5 | ```shell 6 | cd ./back-end/JSON\ Hijacking 7 | docker-compose up --build --force-recreate 8 | ``` 9 | 10 | 打开浏览器,访问: [http://127.0.0.1:8089](http://127.0.0.1:8089) 11 | 12 | 使用账号 `william` 和密码 `000000` 进行登陆。 13 | 14 | 登陆成功后,再打开 [http://127.0.0.1:8088](http://127.0.0.1:8088) 15 | 16 | 现在去看看 `./back-end/JSON\ Hijacking/hacker_web/info.txt` 文件里的内容吧 -------------------------------------------------------------------------------- /front-end/XSS/DOM-XSS/src/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | DOM XSS 5 | 6 | 7 |

嘿,来尝试弹窗吧。

8 | Tips: 更改锚点时,记得手动刷新当前网页(因为锚点的改动默认不会刷新网页) 9 | 10 | 16 | -------------------------------------------------------------------------------- /back-end/XSS/persistent/README.md: -------------------------------------------------------------------------------- 1 | ### 存储型XSS 2 | 3 | 启动命令: 4 | 5 | ```shell 6 | cd ./back-end/XSS/persistent 7 | docker-compose up --build --force-recreate 8 | ``` 9 | 10 | 打开浏览器,访问: [http://127.0.0.1:8083](http://127.0.0.1:8083) 11 | 12 | 现在尝试在输入框里输入下面任意一行内容: 13 | * `` 14 | * `` 15 | 16 | 会发现无法弹窗,这个时候再使用 [ModHeader](https://bewisse.com/modheader/) 修改`CLIENT-IP`为上面的任意一行内容,即可发现弹窗 -------------------------------------------------------------------------------- /back-end/SSRF/docker-compose.yml: -------------------------------------------------------------------------------- 1 | version: '3' 2 | services: 3 | inner-web: 4 | image: httpd:2.4 5 | container_name: back-end-ssrf-inner-web 6 | volumes: 7 | - ./inner_web:/usr/local/apache2/htdocs/ 8 | outer-web: 9 | image: php:7.2-apache 10 | container_name: back-end-ssrf-outer-web 11 | links: 12 | - inner-web 13 | ports: 14 | - "8087:80" 15 | volumes: 16 | - ./outer_web:/var/www/html/ -------------------------------------------------------------------------------- /back-end/XSS/persistent/client/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 存储型XSS - 讨论区 5 | 6 | 7 | 8 |
9 |
10 | 11 | 12 | 13 | 14 | 15 | -------------------------------------------------------------------------------- /back-end/XSS/non-persistent/src/index.php: -------------------------------------------------------------------------------- 1 | 5 | 6 | 7 | 8 | 9 | XSS - 反射XSS 10 | 11 | 12 | 我是一只小方块"; 18 | ?> 19 | 20 | -------------------------------------------------------------------------------- /back-end/CSRF/README.md: -------------------------------------------------------------------------------- 1 | ### CSRF 2 | 3 | 启动命令: 4 | 5 | ```shell 6 | cd ./back-end/CSRF 7 | docker-compose up --build --force-recreate 8 | ``` 9 | 10 | 打开浏览器,访问: [http://127.0.0.1:8086](http://127.0.0.1:8086) 11 | 12 | 先使用账号 `test` 和密码 `123` 进行登陆,会提示账号或密码错误。出现这个错误后,说明数据库里是没有这个管理员账户的。 13 | 14 | 这个时候使用默认的账号 `root` 密码 `000000` 来进行登陆。登陆成功后。再访问 [http://127.0.0.1:8085/](http://127.0.0.1:8085/) 15 | 16 | 访问后,再回到 [http://127.0.0.1:8086](http://127.0.0.1:8086) 页面,使用账号 `test` 和密码 `123` 进行登陆。会发现登陆成功。 17 | 18 | > 感谢 [@wangbayang](https://github.com/wangbayang) 帮我写了页面的`CSS` -------------------------------------------------------------------------------- /back-end/CSRF/docker-compose.yml: -------------------------------------------------------------------------------- 1 | version: '3' 2 | services: 3 | hacker-web: 4 | image: httpd:2.4 5 | container_name: back-end-csrf-hacker-web 6 | ports: 7 | - "8085:80" 8 | volumes: 9 | - ./hacker_web:/usr/local/apache2/htdocs/ 10 | manage: 11 | build: ./manage 12 | container_name: back-end-csrf-manage 13 | links: 14 | - db 15 | ports: 16 | - "8086:80" 17 | volumes: 18 | - ./manage:/var/www/html/ 19 | env_file: ./variables.env 20 | db: 21 | build: ./mysql 22 | container_name: back-end-csrf-mysql 23 | env_file: ./variables.env -------------------------------------------------------------------------------- /back-end/JSON Hijacking/docker-compose.yml: -------------------------------------------------------------------------------- 1 | version: '3' 2 | services: 3 | hacker-web: 4 | image: php:7.2-apache 5 | container_name: back-end-json-hijacking-hacker-web 6 | ports: 7 | - "8088:80" 8 | volumes: 9 | - ./hacker_web:/var/www/html/ 10 | manage: 11 | build: ./web 12 | container_name: back-end-json-hijacking-web 13 | links: 14 | - db 15 | ports: 16 | - "8089:80" 17 | volumes: 18 | - ./web:/var/www/html/ 19 | env_file: ./variables.env 20 | db: 21 | build: ./mysql 22 | container_name: back-end-json-hijacking-mysql 23 | env_file: ./variables.env -------------------------------------------------------------------------------- /back-end/XSS/persistent/docker-compose.yml: -------------------------------------------------------------------------------- 1 | version: '3' 2 | services: 3 | client: 4 | image: httpd:2.4 5 | container_name: back-end-xss-persistent-client 6 | ports: 7 | - "8083:80" 8 | volumes: 9 | - ./client:/usr/local/apache2/htdocs/ 10 | server: 11 | build: ./server 12 | container_name: back-end-xss-persistent-server 13 | links: 14 | - db 15 | ports: 16 | - "8084:80" 17 | volumes: 18 | - ./server:/var/www/html/ 19 | env_file: ./variables.env 20 | db: 21 | build: ./mysql 22 | container_name: back-end-xss-persistent-mysql 23 | env_file: ./variables.env -------------------------------------------------------------------------------- /back-end/CSRF/manage/style.css: -------------------------------------------------------------------------------- 1 | .input-group { 2 | display: flex; 3 | width: 100%; 4 | } 5 | 6 | .input-group:first-child { 7 | margin-bottom: 20px; 8 | } 9 | 10 | .input-group:last-child { 11 | margin-top: 15px; 12 | justify-content: flex-end; 13 | } 14 | 15 | form { 16 | width: fit-content; 17 | display: flex; 18 | flex-direction: column; 19 | align-items: flex-end; 20 | } 21 | 22 | input { 23 | height: 25px; 24 | border: 1px solid #999; 25 | border-radius: 5px; 26 | outline: none; 27 | } 28 | 29 | button { 30 | background-color: lightblue; 31 | padding: 3px 10px; 32 | border-radius: 5px; 33 | } 34 | 35 | label { 36 | margin-right: 10px; 37 | } -------------------------------------------------------------------------------- /back-end/JSON Hijacking/hacker_web/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | JSON Hijacking - hacked! 5 | 11 | 12 | 13 |

当你打开这个网站的时候,我就知道你的余额了

14 | 15 | 22 | 23 | -------------------------------------------------------------------------------- /back-end/JSON Hijacking/web/style.css: -------------------------------------------------------------------------------- 1 | .input-group { 2 | display: flex; 3 | width: 100%; 4 | } 5 | 6 | .input-group:first-child { 7 | margin-bottom: 20px; 8 | } 9 | 10 | .input-group:last-child { 11 | margin-top: 15px; 12 | justify-content: flex-end; 13 | } 14 | 15 | form { 16 | width: fit-content; 17 | display: flex; 18 | flex-direction: column; 19 | align-items: flex-end; 20 | } 21 | 22 | input { 23 | height: 25px; 24 | border: 1px solid #999; 25 | border-radius: 5px; 26 | outline: none; 27 | } 28 | 29 | button { 30 | background-color: lightblue; 31 | padding: 3px 10px; 32 | border-radius: 5px; 33 | } 34 | 35 | label { 36 | margin-right: 10px; 37 | } -------------------------------------------------------------------------------- /back-end/XSS/persistent/server/getContent.php: -------------------------------------------------------------------------------- 1 | connect_error) { 7 | die("数据库连接失败: " . $conn->connect_error); 8 | } 9 | 10 | $sql = "SELECT * FROM xss.message"; 11 | $result = $conn->query($sql); 12 | 13 | if ($result->num_rows > 0) { 14 | $arr = array(); 15 | 16 | while($row = $result->fetch_assoc()) { 17 | array_push($arr, $row); 18 | } 19 | 20 | echo json_encode($arr); 21 | } else { 22 | echo json_encode([]); 23 | } 24 | $conn->close(); 25 | ?> -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # web-security-docker 2 | 3 | 分享文章可见: [Web安全概览](https://github.com/alo7/blog-FE/issues/21) 4 | 5 | ## 前端 6 | 7 | [DOM XSS](https://github.com/alo7/web-security-docker/tree/master/front-end/XSS/DOM-XSS) 8 | 9 | ## 后端 10 | 11 | [反射型XSS](https://github.com/alo7/web-security-docker/tree/master/back-end/XSS/non-persistent) 12 | 13 | [存储型XSS](https://github.com/alo7/web-security-docker/tree/master/back-end/XSS/persistent) 14 | 15 | [CSRF](https://github.com/alo7/web-security-docker/tree/master/back-end/CSRF) 16 | 17 | [SSRF](https://github.com/alo7/web-security-docker/tree/master/back-end/SSRF) 18 | 19 | [JSON Hijacking](https://github.com/alo7/web-security-docker/tree/master/back-end/JSON%20Hijacking) -------------------------------------------------------------------------------- /back-end/CSRF/manage/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 管理员登陆 5 | 6 | 7 | 8 |
9 |
10 | 11 | 12 |
13 |
14 | 15 | 16 |
17 |
18 | 19 |
20 |
21 | 22 | -------------------------------------------------------------------------------- /back-end/JSON Hijacking/web/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 用户登陆 5 | 6 | 7 | 8 |
9 |
10 | 11 | 12 |
13 |
14 | 15 | 16 |
17 |
18 | 19 |
20 |
21 | 22 | -------------------------------------------------------------------------------- /back-end/SSRF/README.md: -------------------------------------------------------------------------------- 1 | ### SSRF 2 | 3 | 启动命令: 4 | 5 | ```shell 6 | cd ./back-end/SSRF 7 | docker-compose up --build --force-recreate 8 | ``` 9 | 10 | 打开浏览器,访问: [http://127.0.0.1:8087](http://127.0.0.1:8087) 11 | 12 | 先在输入框里输入 `https://www.baidu.com/`,看看是否可以拿到百度首页的 `HTML` 源码。 13 | 14 | 现在再在输入框里输入 `http://inner-web`,看看能不能访问到内网资源吧 15 | 16 | > `inner-web` 是 `docker-compose` 在启动 `docker` 时 `link` 的作用,在 `docker` 容器的 `hosts`,会加上 `内网ip inner-web` 17 | > 关于 `link` 的更多介绍,可见: [关于对docker run --link的理解](https://www.jianshu.com/p/21d66ca6115e)、[Legacy container links](https://docs.docker.com/network/links/) 18 | 19 | 那除了可以访问内网的 `http[s]`,还有什么呢? 20 | 21 | 答案是,如果网站的代码或者过滤没有写好的话,是支持 `ftp`、`file` 等协议的。 22 | 23 | 现在,再在输入框里输入: `file:///etc/passwd`,来进行尝试吧。 -------------------------------------------------------------------------------- /back-end/SSRF/outer_web/index.php: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | SSRF - 在线查看网页源代码 5 | 6 | 7 | 8 | 9 | 10 | 11 | ".htmlspecialchars($websiteCode, ENT_QUOTES).""; 22 | ?> 23 | 24 | -------------------------------------------------------------------------------- /back-end/JSON Hijacking/web/main.php: -------------------------------------------------------------------------------- 1 | location.href='index.html'"; 7 | exit(); 8 | } 9 | ?> 10 | 11 | 12 | 13 | 14 | 管理页面 15 | 16 | 17 | 18 |

欢迎回来

19 | 您的余额还剩: 20 | 21 | 27 | 28 | -------------------------------------------------------------------------------- /back-end/CSRF/manage/addAdminUser.php: -------------------------------------------------------------------------------- 1 | location.href='index.html'"; 7 | exit(); 8 | } 9 | 10 | $username = $_POST['username']; 11 | $password = $_POST['password']; 12 | 13 | if ("" == trim($username) || "" == trim($password)) { 14 | echo ""; 15 | exit(); 16 | } 17 | 18 | $conn = new mysqli('db', getenv('MYSQL_USER'), getenv('MYSQL_PASSWORD')); 19 | if ($conn->connect_error) { 20 | die("数据库连接失败: " . $conn->connect_error); 21 | } 22 | 23 | // 对 password 进行 md5 加密,并存入数据库里 24 | $password = md5($password); 25 | $sql = "INSERT INTO csrf.admin (username, password) VALUES ('$username', '$password')"; 26 | $conn->query($sql); 27 | $conn->close(); 28 | 29 | echo "新建 $username 管理员用户成功"; 30 | ?> -------------------------------------------------------------------------------- /back-end/XSS/persistent/server/postContent.php: -------------------------------------------------------------------------------- 1 | connect_error) { 7 | die("数据库连接失败: " . $conn->connect_error); 8 | } 9 | 10 | // 获取客户端的IP地址 11 | // 此段代码来之:https://stackoverflow.com/questions/3003145/how-to-get-the-client-ip-address-in-php 12 | $ipaddress = 'UNKNOWN'; 13 | $keys = array('HTTP_CLIENT_IP', 'HTTP_X_FORWARDED_FOR', 'REMOTE_ADDR'); 14 | foreach($keys as $k) { 15 | if (isset($_SERVER[$k]) && !empty($_SERVER[$k])) { 16 | $ipaddress = $_SERVER[$k]; 17 | break; 18 | } 19 | } 20 | 21 | // 获取发表的内容 22 | $content = htmlspecialchars($_POST['content'], ENT_QUOTES); 23 | 24 | $sql = "INSERT INTO xss.message (content, ip) VALUES ('$content', '$ipaddress')"; 25 | $conn->query($sql); 26 | $conn->close(); 27 | ?> -------------------------------------------------------------------------------- /back-end/CSRF/manage/main.php: -------------------------------------------------------------------------------- 1 | location.href='index.html'"; 7 | exit(); 8 | } 9 | ?> 10 | 11 | 12 | 13 | 14 | 管理页面 15 | 16 | 17 | 18 |

欢迎回来

19 |
20 |
21 |
22 | 23 | 24 |
25 |
26 | 27 | 28 |
29 |
30 | 31 |
32 |
33 |
34 | 35 | -------------------------------------------------------------------------------- /back-end/CSRF/manage/login.php: -------------------------------------------------------------------------------- 1 | setTimeout(() => {location.href='index.html'}, 3000)"; 8 | exit(); 9 | } 10 | 11 | if ("" == trim($username) || "" == trim($password)) { 12 | goBack('请填写账号或密码'); 13 | } 14 | 15 | $conn = new mysqli('db', getenv('MYSQL_USER'), getenv('MYSQL_PASSWORD')); 16 | if ($conn->connect_error) { 17 | die("数据库连接失败: " . $conn->connect_error); 18 | } 19 | 20 | // 对 password 进行 md5 加密,并存入数据库里 21 | $password = md5($password); 22 | $sql = "SELECT * FROM csrf.admin WHERE username='$username' and password='$password'"; 23 | $result = $conn->query($sql); 24 | 25 | // 判断数据库里是否有此用户 26 | if (mysqli_num_rows($result)) { 27 | // 设置cookies,并以-分割 28 | setcookie('user_flag', $password.'-'.$username, time() + 3600 * 24); 29 | header('Location: ./main.php'); 30 | } else { 31 | goBack('账号密码错误'); 32 | } 33 | $conn->close(); 34 | ?> -------------------------------------------------------------------------------- /back-end/JSON Hijacking/web/login.php: -------------------------------------------------------------------------------- 1 | setTimeout(() => {location.href='index.html'}, 3000)"; 8 | exit(); 9 | } 10 | 11 | if ("" == trim($username) || "" == trim($password)) { 12 | goBack('请填写账号或密码'); 13 | } 14 | 15 | $conn = new mysqli('db', getenv('MYSQL_USER'), getenv('MYSQL_PASSWORD')); 16 | if ($conn->connect_error) { 17 | die("数据库连接失败: " . $conn->connect_error); 18 | } 19 | 20 | // 对 password 进行 md5 加密,并存入数据库里 21 | $password = md5($password); 22 | $sql = "SELECT * FROM json_hijacking.user WHERE username='$username' and password='$password'"; 23 | $result = $conn->query($sql); 24 | 25 | // 判断数据库里是否有此用户 26 | if (mysqli_num_rows($result)) { 27 | // 设置cookies,并以-分割 28 | setcookie('user_flag', $password.'-'.$username, time() + 3600 * 24); 29 | header('Location: ./main.php'); 30 | } else { 31 | goBack('账号密码错误'); 32 | } 33 | $conn->close(); 34 | ?> -------------------------------------------------------------------------------- /back-end/CSRF/manage/utils.php: -------------------------------------------------------------------------------- 1 | connect_error) { 26 | die("数据库连接失败: " . $conn->connect_error); 27 | } 28 | 29 | $sql = "SELECT * FROM csrf.admin WHERE username='$usernameByCookies' and password='$passwordByCookies'"; 30 | $result = $conn->query($sql); 31 | 32 | if (!mysqli_num_rows($result)) { 33 | return []; 34 | } 35 | 36 | return [$usernameByCookies, $passwordByCookies]; 37 | } 38 | ?> -------------------------------------------------------------------------------- /back-end/XSS/persistent/client/js.js: -------------------------------------------------------------------------------- 1 | const template = data => { 2 | return ` 3 |
4 | IP: ${data.ip} 说道: 5 | ${data.content} 6 |
`; 7 | }; 8 | 9 | // 获取内容 10 | const getContent = () => { 11 | $.ajax({ 12 | url: 'http://127.0.0.1:8084/getContent.php', 13 | method: 'GET', 14 | async: true 15 | }) 16 | .done(data => { 17 | data = JSON.parse(data); 18 | // 清空内容 19 | $('.message-item').remove(); 20 | 21 | // 插入数据 22 | for (let i = 0; i < data.length; i++) { 23 | $('.message-board').append(template(data[i])); 24 | } 25 | }) 26 | }; 27 | 28 | // 点击提交 29 | $('#submit').click(() => { 30 | const content = $('textarea').val(); 31 | if (content === '') { 32 | return; 33 | } 34 | 35 | $.ajax({ 36 | url: 'http://127.0.0.1:8084/postContent.php', 37 | method: 'POST', 38 | async: true, 39 | data: { 40 | content 41 | } 42 | }) 43 | .done(() => { 44 | getContent(); 45 | }) 46 | }); 47 | 48 | $(document).ready(() => { 49 | getContent(); 50 | }); -------------------------------------------------------------------------------- /back-end/JSON Hijacking/web/utils.php: -------------------------------------------------------------------------------- 1 | connect_error) { 26 | die("数据库连接失败: " . $conn->connect_error); 27 | } 28 | 29 | $sql = "SELECT balance FROM json_hijacking.user WHERE username='$usernameByCookies' and password='$passwordByCookies'"; 30 | $result = $conn->query($sql); 31 | 32 | if (!mysqli_num_rows($result)) { 33 | return []; 34 | } 35 | 36 | return [$usernameByCookies, $passwordByCookies, mysqli_fetch_assoc($result)["balance"]]; 37 | } 38 | ?> -------------------------------------------------------------------------------- /back-end/XSS/persistent/client/jquery-3.4.1.min.js: -------------------------------------------------------------------------------- 1 | /*! jQuery v3.4.1 | (c) JS Foundation and other contributors | jquery.org/license */ 2 | !function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],E=C.document,r=Object.getPrototypeOf,s=t.slice,g=t.concat,u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType},x=function(e){return null!=e&&e===e.window},c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}function w(e){return null==e?e+"":"object"==typeof e||"function"==typeof e?n[o.call(e)]||"object":typeof e}var f="3.4.1",k=function(e,t){return new k.fn.init(e,t)},p=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g;function d(e){var t=!!e&&"length"in e&&e.length,n=w(e);return!m(e)&&!x(e)&&("array"===n||0===t||"number"==typeof t&&0+~]|"+M+")"+M+"*"),U=new RegExp(M+"|>"),X=new RegExp($),V=new RegExp("^"+I+"$"),G={ID:new RegExp("^#("+I+")"),CLASS:new RegExp("^\\.("+I+")"),TAG:new RegExp("^("+I+"|[*])"),ATTR:new RegExp("^"+W),PSEUDO:new RegExp("^"+$),CHILD:new RegExp("^:(only|first|last|nth|nth-last)-(child|of-type)(?:\\("+M+"*(even|odd|(([+-]|)(\\d*)n|)"+M+"*(?:([+-]|)"+M+"*(\\d+)|))"+M+"*\\)|)","i"),bool:new RegExp("^(?:"+R+")$","i"),needsContext:new RegExp("^"+M+"*[>+~]|:(even|odd|eq|gt|lt|nth|first|last)(?:\\("+M+"*((?:-\\d)?\\d*)"+M+"*\\)|)(?=[^-]|$)","i")},Y=/HTML$/i,Q=/^(?:input|select|textarea|button)$/i,J=/^h\d$/i,K=/^[^{]+\{\s*\[native \w/,Z=/^(?:#([\w-]+)|(\w+)|\.([\w-]+))$/,ee=/[+~]/,te=new RegExp("\\\\([\\da-f]{1,6}"+M+"?|("+M+")|.)","ig"),ne=function(e,t,n){var r="0x"+t-65536;return r!=r||n?t:r<0?String.fromCharCode(r+65536):String.fromCharCode(r>>10|55296,1023&r|56320)},re=/([\0-\x1f\x7f]|^-?\d)|^-$|[^\0-\x1f\x7f-\uFFFF\w-]/g,ie=function(e,t){return t?"\0"===e?"\ufffd":e.slice(0,-1)+"\\"+e.charCodeAt(e.length-1).toString(16)+" ":"\\"+e},oe=function(){T()},ae=be(function(e){return!0===e.disabled&&"fieldset"===e.nodeName.toLowerCase()},{dir:"parentNode",next:"legend"});try{H.apply(t=O.call(m.childNodes),m.childNodes),t[m.childNodes.length].nodeType}catch(e){H={apply:t.length?function(e,t){L.apply(e,O.call(t))}:function(e,t){var n=e.length,r=0;while(e[n++]=t[r++]);e.length=n-1}}}function se(t,e,n,r){var i,o,a,s,u,l,c,f=e&&e.ownerDocument,p=e?e.nodeType:9;if(n=n||[],"string"!=typeof t||!t||1!==p&&9!==p&&11!==p)return n;if(!r&&((e?e.ownerDocument||e:m)!==C&&T(e),e=e||C,E)){if(11!==p&&(u=Z.exec(t)))if(i=u[1]){if(9===p){if(!(a=e.getElementById(i)))return n;if(a.id===i)return n.push(a),n}else if(f&&(a=f.getElementById(i))&&y(e,a)&&a.id===i)return n.push(a),n}else{if(u[2])return H.apply(n,e.getElementsByTagName(t)),n;if((i=u[3])&&d.getElementsByClassName&&e.getElementsByClassName)return H.apply(n,e.getElementsByClassName(i)),n}if(d.qsa&&!A[t+" "]&&(!v||!v.test(t))&&(1!==p||"object"!==e.nodeName.toLowerCase())){if(c=t,f=e,1===p&&U.test(t)){(s=e.getAttribute("id"))?s=s.replace(re,ie):e.setAttribute("id",s=k),o=(l=h(t)).length;while(o--)l[o]="#"+s+" "+xe(l[o]);c=l.join(","),f=ee.test(t)&&ye(e.parentNode)||e}try{return H.apply(n,f.querySelectorAll(c)),n}catch(e){A(t,!0)}finally{s===k&&e.removeAttribute("id")}}}return g(t.replace(B,"$1"),e,n,r)}function ue(){var r=[];return function e(t,n){return r.push(t+" ")>b.cacheLength&&delete e[r.shift()],e[t+" "]=n}}function le(e){return e[k]=!0,e}function ce(e){var t=C.createElement("fieldset");try{return!!e(t)}catch(e){return!1}finally{t.parentNode&&t.parentNode.removeChild(t),t=null}}function fe(e,t){var n=e.split("|"),r=n.length;while(r--)b.attrHandle[n[r]]=t}function pe(e,t){var n=t&&e,r=n&&1===e.nodeType&&1===t.nodeType&&e.sourceIndex-t.sourceIndex;if(r)return r;if(n)while(n=n.nextSibling)if(n===t)return-1;return e?1:-1}function de(t){return function(e){return"input"===e.nodeName.toLowerCase()&&e.type===t}}function he(n){return function(e){var t=e.nodeName.toLowerCase();return("input"===t||"button"===t)&&e.type===n}}function ge(t){return function(e){return"form"in e?e.parentNode&&!1===e.disabled?"label"in e?"label"in e.parentNode?e.parentNode.disabled===t:e.disabled===t:e.isDisabled===t||e.isDisabled!==!t&&ae(e)===t:e.disabled===t:"label"in e&&e.disabled===t}}function ve(a){return le(function(o){return o=+o,le(function(e,t){var n,r=a([],e.length,o),i=r.length;while(i--)e[n=r[i]]&&(e[n]=!(t[n]=e[n]))})})}function ye(e){return e&&"undefined"!=typeof e.getElementsByTagName&&e}for(e in d=se.support={},i=se.isXML=function(e){var t=e.namespaceURI,n=(e.ownerDocument||e).documentElement;return!Y.test(t||n&&n.nodeName||"HTML")},T=se.setDocument=function(e){var t,n,r=e?e.ownerDocument||e:m;return r!==C&&9===r.nodeType&&r.documentElement&&(a=(C=r).documentElement,E=!i(C),m!==C&&(n=C.defaultView)&&n.top!==n&&(n.addEventListener?n.addEventListener("unload",oe,!1):n.attachEvent&&n.attachEvent("onunload",oe)),d.attributes=ce(function(e){return e.className="i",!e.getAttribute("className")}),d.getElementsByTagName=ce(function(e){return e.appendChild(C.createComment("")),!e.getElementsByTagName("*").length}),d.getElementsByClassName=K.test(C.getElementsByClassName),d.getById=ce(function(e){return a.appendChild(e).id=k,!C.getElementsByName||!C.getElementsByName(k).length}),d.getById?(b.filter.ID=function(e){var t=e.replace(te,ne);return function(e){return e.getAttribute("id")===t}},b.find.ID=function(e,t){if("undefined"!=typeof t.getElementById&&E){var n=t.getElementById(e);return n?[n]:[]}}):(b.filter.ID=function(e){var n=e.replace(te,ne);return function(e){var t="undefined"!=typeof e.getAttributeNode&&e.getAttributeNode("id");return t&&t.value===n}},b.find.ID=function(e,t){if("undefined"!=typeof t.getElementById&&E){var n,r,i,o=t.getElementById(e);if(o){if((n=o.getAttributeNode("id"))&&n.value===e)return[o];i=t.getElementsByName(e),r=0;while(o=i[r++])if((n=o.getAttributeNode("id"))&&n.value===e)return[o]}return[]}}),b.find.TAG=d.getElementsByTagName?function(e,t){return"undefined"!=typeof t.getElementsByTagName?t.getElementsByTagName(e):d.qsa?t.querySelectorAll(e):void 0}:function(e,t){var n,r=[],i=0,o=t.getElementsByTagName(e);if("*"===e){while(n=o[i++])1===n.nodeType&&r.push(n);return r}return o},b.find.CLASS=d.getElementsByClassName&&function(e,t){if("undefined"!=typeof t.getElementsByClassName&&E)return t.getElementsByClassName(e)},s=[],v=[],(d.qsa=K.test(C.querySelectorAll))&&(ce(function(e){a.appendChild(e).innerHTML="",e.querySelectorAll("[msallowcapture^='']").length&&v.push("[*^$]="+M+"*(?:''|\"\")"),e.querySelectorAll("[selected]").length||v.push("\\["+M+"*(?:value|"+R+")"),e.querySelectorAll("[id~="+k+"-]").length||v.push("~="),e.querySelectorAll(":checked").length||v.push(":checked"),e.querySelectorAll("a#"+k+"+*").length||v.push(".#.+[+~]")}),ce(function(e){e.innerHTML="";var t=C.createElement("input");t.setAttribute("type","hidden"),e.appendChild(t).setAttribute("name","D"),e.querySelectorAll("[name=d]").length&&v.push("name"+M+"*[*^$|!~]?="),2!==e.querySelectorAll(":enabled").length&&v.push(":enabled",":disabled"),a.appendChild(e).disabled=!0,2!==e.querySelectorAll(":disabled").length&&v.push(":enabled",":disabled"),e.querySelectorAll("*,:x"),v.push(",.*:")})),(d.matchesSelector=K.test(c=a.matches||a.webkitMatchesSelector||a.mozMatchesSelector||a.oMatchesSelector||a.msMatchesSelector))&&ce(function(e){d.disconnectedMatch=c.call(e,"*"),c.call(e,"[s!='']:x"),s.push("!=",$)}),v=v.length&&new RegExp(v.join("|")),s=s.length&&new RegExp(s.join("|")),t=K.test(a.compareDocumentPosition),y=t||K.test(a.contains)?function(e,t){var n=9===e.nodeType?e.documentElement:e,r=t&&t.parentNode;return e===r||!(!r||1!==r.nodeType||!(n.contains?n.contains(r):e.compareDocumentPosition&&16&e.compareDocumentPosition(r)))}:function(e,t){if(t)while(t=t.parentNode)if(t===e)return!0;return!1},D=t?function(e,t){if(e===t)return l=!0,0;var n=!e.compareDocumentPosition-!t.compareDocumentPosition;return n||(1&(n=(e.ownerDocument||e)===(t.ownerDocument||t)?e.compareDocumentPosition(t):1)||!d.sortDetached&&t.compareDocumentPosition(e)===n?e===C||e.ownerDocument===m&&y(m,e)?-1:t===C||t.ownerDocument===m&&y(m,t)?1:u?P(u,e)-P(u,t):0:4&n?-1:1)}:function(e,t){if(e===t)return l=!0,0;var n,r=0,i=e.parentNode,o=t.parentNode,a=[e],s=[t];if(!i||!o)return e===C?-1:t===C?1:i?-1:o?1:u?P(u,e)-P(u,t):0;if(i===o)return pe(e,t);n=e;while(n=n.parentNode)a.unshift(n);n=t;while(n=n.parentNode)s.unshift(n);while(a[r]===s[r])r++;return r?pe(a[r],s[r]):a[r]===m?-1:s[r]===m?1:0}),C},se.matches=function(e,t){return se(e,null,null,t)},se.matchesSelector=function(e,t){if((e.ownerDocument||e)!==C&&T(e),d.matchesSelector&&E&&!A[t+" "]&&(!s||!s.test(t))&&(!v||!v.test(t)))try{var n=c.call(e,t);if(n||d.disconnectedMatch||e.document&&11!==e.document.nodeType)return n}catch(e){A(t,!0)}return 0":{dir:"parentNode",first:!0}," ":{dir:"parentNode"},"+":{dir:"previousSibling",first:!0},"~":{dir:"previousSibling"}},preFilter:{ATTR:function(e){return e[1]=e[1].replace(te,ne),e[3]=(e[3]||e[4]||e[5]||"").replace(te,ne),"~="===e[2]&&(e[3]=" "+e[3]+" "),e.slice(0,4)},CHILD:function(e){return e[1]=e[1].toLowerCase(),"nth"===e[1].slice(0,3)?(e[3]||se.error(e[0]),e[4]=+(e[4]?e[5]+(e[6]||1):2*("even"===e[3]||"odd"===e[3])),e[5]=+(e[7]+e[8]||"odd"===e[3])):e[3]&&se.error(e[0]),e},PSEUDO:function(e){var t,n=!e[6]&&e[2];return G.CHILD.test(e[0])?null:(e[3]?e[2]=e[4]||e[5]||"":n&&X.test(n)&&(t=h(n,!0))&&(t=n.indexOf(")",n.length-t)-n.length)&&(e[0]=e[0].slice(0,t),e[2]=n.slice(0,t)),e.slice(0,3))}},filter:{TAG:function(e){var t=e.replace(te,ne).toLowerCase();return"*"===e?function(){return!0}:function(e){return e.nodeName&&e.nodeName.toLowerCase()===t}},CLASS:function(e){var t=p[e+" "];return t||(t=new RegExp("(^|"+M+")"+e+"("+M+"|$)"))&&p(e,function(e){return t.test("string"==typeof e.className&&e.className||"undefined"!=typeof e.getAttribute&&e.getAttribute("class")||"")})},ATTR:function(n,r,i){return function(e){var t=se.attr(e,n);return null==t?"!="===r:!r||(t+="","="===r?t===i:"!="===r?t!==i:"^="===r?i&&0===t.indexOf(i):"*="===r?i&&-1:\x20\t\r\n\f]*)[\x20\t\r\n\f]*\/?>(?:<\/\1>|)$/i;function j(e,n,r){return m(n)?k.grep(e,function(e,t){return!!n.call(e,t,e)!==r}):n.nodeType?k.grep(e,function(e){return e===n!==r}):"string"!=typeof n?k.grep(e,function(e){return-1)[^>]*|#([\w-]+))$/;(k.fn.init=function(e,t,n){var r,i;if(!e)return this;if(n=n||q,"string"==typeof e){if(!(r="<"===e[0]&&">"===e[e.length-1]&&3<=e.length?[null,e,null]:L.exec(e))||!r[1]&&t)return!t||t.jquery?(t||n).find(e):this.constructor(t).find(e);if(r[1]){if(t=t instanceof k?t[0]:t,k.merge(this,k.parseHTML(r[1],t&&t.nodeType?t.ownerDocument||t:E,!0)),D.test(r[1])&&k.isPlainObject(t))for(r in t)m(this[r])?this[r](t[r]):this.attr(r,t[r]);return this}return(i=E.getElementById(r[2]))&&(this[0]=i,this.length=1),this}return e.nodeType?(this[0]=e,this.length=1,this):m(e)?void 0!==n.ready?n.ready(e):e(k):k.makeArray(e,this)}).prototype=k.fn,q=k(E);var H=/^(?:parents|prev(?:Until|All))/,O={children:!0,contents:!0,next:!0,prev:!0};function P(e,t){while((e=e[t])&&1!==e.nodeType);return e}k.fn.extend({has:function(e){var t=k(e,this),n=t.length;return this.filter(function(){for(var e=0;e\x20\t\r\n\f]*)/i,he=/^$|^module$|\/(?:java|ecma)script/i,ge={option:[1,""],thead:[1,"","
"],col:[2,"","
"],tr:[2,"","
"],td:[3,"","
"],_default:[0,"",""]};function ve(e,t){var n;return n="undefined"!=typeof e.getElementsByTagName?e.getElementsByTagName(t||"*"):"undefined"!=typeof e.querySelectorAll?e.querySelectorAll(t||"*"):[],void 0===t||t&&A(e,t)?k.merge([e],n):n}function ye(e,t){for(var n=0,r=e.length;nx",y.noCloneChecked=!!me.cloneNode(!0).lastChild.defaultValue;var Te=/^key/,Ce=/^(?:mouse|pointer|contextmenu|drag|drop)|click/,Ee=/^([^.]*)(?:\.(.+)|)/;function ke(){return!0}function Se(){return!1}function Ne(e,t){return e===function(){try{return E.activeElement}catch(e){}}()==("focus"===t)}function Ae(e,t,n,r,i,o){var a,s;if("object"==typeof t){for(s in"string"!=typeof n&&(r=r||n,n=void 0),t)Ae(e,s,n,r,t[s],o);return e}if(null==r&&null==i?(i=n,r=n=void 0):null==i&&("string"==typeof n?(i=r,r=void 0):(i=r,r=n,n=void 0)),!1===i)i=Se;else if(!i)return e;return 1===o&&(a=i,(i=function(e){return k().off(e),a.apply(this,arguments)}).guid=a.guid||(a.guid=k.guid++)),e.each(function(){k.event.add(this,t,i,r,n)})}function De(e,i,o){o?(Q.set(e,i,!1),k.event.add(e,i,{namespace:!1,handler:function(e){var t,n,r=Q.get(this,i);if(1&e.isTrigger&&this[i]){if(r.length)(k.event.special[i]||{}).delegateType&&e.stopPropagation();else if(r=s.call(arguments),Q.set(this,i,r),t=o(this,i),this[i](),r!==(n=Q.get(this,i))||t?Q.set(this,i,!1):n={},r!==n)return e.stopImmediatePropagation(),e.preventDefault(),n.value}else r.length&&(Q.set(this,i,{value:k.event.trigger(k.extend(r[0],k.Event.prototype),r.slice(1),this)}),e.stopImmediatePropagation())}})):void 0===Q.get(e,i)&&k.event.add(e,i,ke)}k.event={global:{},add:function(t,e,n,r,i){var o,a,s,u,l,c,f,p,d,h,g,v=Q.get(t);if(v){n.handler&&(n=(o=n).handler,i=o.selector),i&&k.find.matchesSelector(ie,i),n.guid||(n.guid=k.guid++),(u=v.events)||(u=v.events={}),(a=v.handle)||(a=v.handle=function(e){return"undefined"!=typeof k&&k.event.triggered!==e.type?k.event.dispatch.apply(t,arguments):void 0}),l=(e=(e||"").match(R)||[""]).length;while(l--)d=g=(s=Ee.exec(e[l])||[])[1],h=(s[2]||"").split(".").sort(),d&&(f=k.event.special[d]||{},d=(i?f.delegateType:f.bindType)||d,f=k.event.special[d]||{},c=k.extend({type:d,origType:g,data:r,handler:n,guid:n.guid,selector:i,needsContext:i&&k.expr.match.needsContext.test(i),namespace:h.join(".")},o),(p=u[d])||((p=u[d]=[]).delegateCount=0,f.setup&&!1!==f.setup.call(t,r,h,a)||t.addEventListener&&t.addEventListener(d,a)),f.add&&(f.add.call(t,c),c.handler.guid||(c.handler.guid=n.guid)),i?p.splice(p.delegateCount++,0,c):p.push(c),k.event.global[d]=!0)}},remove:function(e,t,n,r,i){var o,a,s,u,l,c,f,p,d,h,g,v=Q.hasData(e)&&Q.get(e);if(v&&(u=v.events)){l=(t=(t||"").match(R)||[""]).length;while(l--)if(d=g=(s=Ee.exec(t[l])||[])[1],h=(s[2]||"").split(".").sort(),d){f=k.event.special[d]||{},p=u[d=(r?f.delegateType:f.bindType)||d]||[],s=s[2]&&new RegExp("(^|\\.)"+h.join("\\.(?:.*\\.|)")+"(\\.|$)"),a=o=p.length;while(o--)c=p[o],!i&&g!==c.origType||n&&n.guid!==c.guid||s&&!s.test(c.namespace)||r&&r!==c.selector&&("**"!==r||!c.selector)||(p.splice(o,1),c.selector&&p.delegateCount--,f.remove&&f.remove.call(e,c));a&&!p.length&&(f.teardown&&!1!==f.teardown.call(e,h,v.handle)||k.removeEvent(e,d,v.handle),delete u[d])}else for(d in u)k.event.remove(e,d+t[l],n,r,!0);k.isEmptyObject(u)&&Q.remove(e,"handle events")}},dispatch:function(e){var t,n,r,i,o,a,s=k.event.fix(e),u=new Array(arguments.length),l=(Q.get(this,"events")||{})[s.type]||[],c=k.event.special[s.type]||{};for(u[0]=s,t=1;t\x20\t\r\n\f]*)[^>]*)\/>/gi,qe=/\s*$/g;function Oe(e,t){return A(e,"table")&&A(11!==t.nodeType?t:t.firstChild,"tr")&&k(e).children("tbody")[0]||e}function Pe(e){return e.type=(null!==e.getAttribute("type"))+"/"+e.type,e}function Re(e){return"true/"===(e.type||"").slice(0,5)?e.type=e.type.slice(5):e.removeAttribute("type"),e}function Me(e,t){var n,r,i,o,a,s,u,l;if(1===t.nodeType){if(Q.hasData(e)&&(o=Q.access(e),a=Q.set(t,o),l=o.events))for(i in delete a.handle,a.events={},l)for(n=0,r=l[i].length;n")},clone:function(e,t,n){var r,i,o,a,s,u,l,c=e.cloneNode(!0),f=oe(e);if(!(y.noCloneChecked||1!==e.nodeType&&11!==e.nodeType||k.isXMLDoc(e)))for(a=ve(c),r=0,i=(o=ve(e)).length;r").attr(n.scriptAttrs||{}).prop({charset:n.scriptCharset,src:n.url}).on("load error",i=function(e){r.remove(),i=null,e&&t("error"===e.type?404:200,e.type)}),E.head.appendChild(r[0])},abort:function(){i&&i()}}});var Vt,Gt=[],Yt=/(=)\?(?=&|$)|\?\?/;k.ajaxSetup({jsonp:"callback",jsonpCallback:function(){var e=Gt.pop()||k.expando+"_"+kt++;return this[e]=!0,e}}),k.ajaxPrefilter("json jsonp",function(e,t,n){var r,i,o,a=!1!==e.jsonp&&(Yt.test(e.url)?"url":"string"==typeof e.data&&0===(e.contentType||"").indexOf("application/x-www-form-urlencoded")&&Yt.test(e.data)&&"data");if(a||"jsonp"===e.dataTypes[0])return r=e.jsonpCallback=m(e.jsonpCallback)?e.jsonpCallback():e.jsonpCallback,a?e[a]=e[a].replace(Yt,"$1"+r):!1!==e.jsonp&&(e.url+=(St.test(e.url)?"&":"?")+e.jsonp+"="+r),e.converters["script json"]=function(){return o||k.error(r+" was not called"),o[0]},e.dataTypes[0]="json",i=C[r],C[r]=function(){o=arguments},n.always(function(){void 0===i?k(C).removeProp(r):C[r]=i,e[r]&&(e.jsonpCallback=t.jsonpCallback,Gt.push(r)),o&&m(i)&&i(o[0]),o=i=void 0}),"script"}),y.createHTMLDocument=((Vt=E.implementation.createHTMLDocument("").body).innerHTML="
",2===Vt.childNodes.length),k.parseHTML=function(e,t,n){return"string"!=typeof e?[]:("boolean"==typeof t&&(n=t,t=!1),t||(y.createHTMLDocument?((r=(t=E.implementation.createHTMLDocument("")).createElement("base")).href=E.location.href,t.head.appendChild(r)):t=E),o=!n&&[],(i=D.exec(e))?[t.createElement(i[1])]:(i=we([e],t,o),o&&o.length&&k(o).remove(),k.merge([],i.childNodes)));var r,i,o},k.fn.load=function(e,t,n){var r,i,o,a=this,s=e.indexOf(" ");return-1").append(k.parseHTML(e)).find(r):e)}).always(n&&function(e,t){a.each(function(){n.apply(this,o||[e.responseText,t,e])})}),this},k.each(["ajaxStart","ajaxStop","ajaxComplete","ajaxError","ajaxSuccess","ajaxSend"],function(e,t){k.fn[t]=function(e){return this.on(t,e)}}),k.expr.pseudos.animated=function(t){return k.grep(k.timers,function(e){return t===e.elem}).length},k.offset={setOffset:function(e,t,n){var r,i,o,a,s,u,l=k.css(e,"position"),c=k(e),f={};"static"===l&&(e.style.position="relative"),s=c.offset(),o=k.css(e,"top"),u=k.css(e,"left"),("absolute"===l||"fixed"===l)&&-1<(o+u).indexOf("auto")?(a=(r=c.position()).top,i=r.left):(a=parseFloat(o)||0,i=parseFloat(u)||0),m(t)&&(t=t.call(e,n,k.extend({},s))),null!=t.top&&(f.top=t.top-s.top+a),null!=t.left&&(f.left=t.left-s.left+i),"using"in t?t.using.call(e,f):c.css(f)}},k.fn.extend({offset:function(t){if(arguments.length)return void 0===t?this:this.each(function(e){k.offset.setOffset(this,t,e)});var e,n,r=this[0];return r?r.getClientRects().length?(e=r.getBoundingClientRect(),n=r.ownerDocument.defaultView,{top:e.top+n.pageYOffset,left:e.left+n.pageXOffset}):{top:0,left:0}:void 0},position:function(){if(this[0]){var e,t,n,r=this[0],i={top:0,left:0};if("fixed"===k.css(r,"position"))t=r.getBoundingClientRect();else{t=this.offset(),n=r.ownerDocument,e=r.offsetParent||n.documentElement;while(e&&(e===n.body||e===n.documentElement)&&"static"===k.css(e,"position"))e=e.parentNode;e&&e!==r&&1===e.nodeType&&((i=k(e).offset()).top+=k.css(e,"borderTopWidth",!0),i.left+=k.css(e,"borderLeftWidth",!0))}return{top:t.top-i.top-k.css(r,"marginTop",!0),left:t.left-i.left-k.css(r,"marginLeft",!0)}}},offsetParent:function(){return this.map(function(){var e=this.offsetParent;while(e&&"static"===k.css(e,"position"))e=e.offsetParent;return e||ie})}}),k.each({scrollLeft:"pageXOffset",scrollTop:"pageYOffset"},function(t,i){var o="pageYOffset"===i;k.fn[t]=function(e){return _(this,function(e,t,n){var r;if(x(e)?r=e:9===e.nodeType&&(r=e.defaultView),void 0===n)return r?r[i]:e[t];r?r.scrollTo(o?r.pageXOffset:n,o?n:r.pageYOffset):e[t]=n},t,e,arguments.length)}}),k.each(["top","left"],function(e,n){k.cssHooks[n]=ze(y.pixelPosition,function(e,t){if(t)return t=_e(e,n),$e.test(t)?k(e).position()[n]+"px":t})}),k.each({Height:"height",Width:"width"},function(a,s){k.each({padding:"inner"+a,content:s,"":"outer"+a},function(r,o){k.fn[o]=function(e,t){var n=arguments.length&&(r||"boolean"!=typeof e),i=r||(!0===e||!0===t?"margin":"border");return _(this,function(e,t,n){var r;return x(e)?0===o.indexOf("outer")?e["inner"+a]:e.document.documentElement["client"+a]:9===e.nodeType?(r=e.documentElement,Math.max(e.body["scroll"+a],r["scroll"+a],e.body["offset"+a],r["offset"+a],r["client"+a])):void 0===n?k.css(e,t,i):k.style(e,t,n,i)},s,n?e:void 0,n)}})}),k.each("blur focus focusin focusout resize scroll click dblclick mousedown mouseup mousemove mouseover mouseout mouseenter mouseleave change select submit keydown keypress keyup contextmenu".split(" "),function(e,n){k.fn[n]=function(e,t){return 0