123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351 |
- ================================================================
- Introduction:
- ==============================
- Cross Site "Scripter" is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
- ================================================================
- Current Version:
- ==============================
- XSSer v1.8[1]: "The Hive!" (2010/2019) // [https://xsser.03c8.net]
- ================================================================
- Options and features:
- ==============================
-
- Usage:
- xsser [OPTIONS] [
- [Request(s)] [Checker(s)] [Vector(s)] [Anti-antiXSS/IDS] [Bypasser(s)] [Technique(s)] [Final Injection(s)] [Reporting] {Miscellaneous}
- Cross Site "Scripter" is an automatic -framework- to detect, exploit and
- report XSS vulnerabilities in web-based applications.
- Options:
-
- -h,
- -s,
- -v,
-
-
- *Special Features*:
- You can set Vector(s) and Bypasser(s) to build complex scripts for XSS
- code embedded. XST allows you to discover if target is vulnerable to
- 'Cross Site Tracing' [CAPEC-107]:
-
-
-
- *Select Target(s)*:
- At least one of these options must to be specified to set the source
- to get target(s) urls from:
-
- -u URL,
- -i READFILE Read target(s) urls from file
- -d DORK Search target(s) using a query (ex: 'news.php?id=')
- -l Search from a list of 'dorks'
-
-
- *Select type of HTTP/HTTPS Connection(s)*:
- These options can be used to specify which parameter(s) we want to use
- as payload(s). Set 'XSS' as keyword on the place(s) that you want to
- inject:
- -g GETDATA Send payload using GET (ex: '/menu.php?id=XSS')
- -p POSTDATA Send payload using POST (ex: 'foo=1&bar=XSS')
- -c CRAWLING Number of urls to crawl on target(s): 1-99999
-
-
- *Configure Request(s)*:
- These options can be used to specify how to connect to the target(s)
- payload(s). You can choose multiple:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- *Checker Systems*:
- These options are useful to know if your target is using filters
- against XSS attacks:
-
-
-
-
-
-
-
-
- *Select Vector(s)*:
- These options can be used to specify injection(s) code. Important if
- you don't want to inject a common XSS vector used by default. Choose
- only one option:
-
-
- *Select Payload(s)*:
- These options can be used to set the list of vectors provided by
- XSSer. Choose only if required:
-
-
-
- *Anti-antiXSS Firewall rules*:
- These options can be used to try to bypass specific WAF/IDS products
- and some anti-XSS browser filters. Choose only if required:
-
-
-
-
-
-
-
-
-
-
-
-
- *Select Bypasser(s)*:
- These options can be used to encode vector(s) and try to bypass
- possible anti-XSS filters. They can be combined with other techniques:
-
-
-
-
-
-
-
-
-
- (reversing obfuscators) (ex: 'Mix,Une,Str,Hex')
- *Special Technique(s)*:
- These options can be used to inject code using different XSS
- techniques and fuzzing vectors. You can choose multiple:
-
-
-
-
-
-
- *Select Final injection(s)*:
- These options can be used to specify the final code to inject on
- vulnerable target(s). Important if you want to exploit 'on-the-wild'
- the vulnerabilities found. Choose only one option:
-
-
- *Special Final injection(s)*:
- These options can be used to execute some 'special' injection(s) on
- vulnerable target(s). You can select multiple and combine them with
- your final code (except with DCP exploits):
-
-
-
-
-
-
- *Reporting*:
-
-
- *Miscellaneous*:
-
-
-
- ================================================================
- Commands and examples:
- ==============================
- * View HELP (Available commands):
-
- xsser -h (
- * Check for latest stable version:
- xsser
- * Launch GTK interface (GUI):
- xsser
- * Simple injection from URL:<br><br>
- xsser -u "https://target.com/XSS"
- * Simple injection from File, with Tor proxy and spoofing HTTP Referer headers
- xsser -i "file.txt"
- * Multiple injections from URL, with automatic payloading, establishing a reverse connection and showing statistics:
- xsser -u "https:/target.com/XSS"
- * Multiple injections from URL, with automatic payloading, using Tor proxy, using "Hexadecimal" encoding, with verbose output and saving results to file (XSSreport.raw):
- xsser -u "https://target.com/XSS"
- * Multiple injections from URL, with automatic payloading, using character encoding mutations (first, changing payload to 'Hexadecimal'; second, changing to 'StringFromCharCode' the first one; third, reencoding to 'Hexadecimal' the second one), with HTTP User-Agent spoofed, changing timeout to "20" and using multithreads (5 threads):
- xsser -u "https://target.com/XSS"
- * Advanced injection from File, payloading your -own- code and using Unescape() character encoding to bypass filters:
- xsser -i "urls.txt"
- * Injection from Dork, selecting "DuckDuckGo" as search engine:
- xsser
- * Injection from a list of Dorks extracted from a file (provided by XSSer) and using all search engines supported (XSSer Storm!):
- xsser -l
- * Injection from Crawler with deep 2 and 200 pages to review (XSSer Spider!):
- xsser -c 200
- * Simple injection from URL, to a POST parameter (ex: password), with statistics results:
- xsser -u "https://target.com/login.php" -p "username=admin&password=XSS" -s
- * Multiple injections (with hex and int hashes) to multiple parameters on a single URLG and using GET:
- xsser -u "https://target.com" -g "login.php?=usernameXSS&password=XSS&captcha=X1S"
- * Simple injection from URL, using GET, injecting on Cookie, trying to use DOM shadow space (no server logging!) and if exists any vulnerability, exploiting your -own- final code:
- xsser -u "https://target.com" -g "/news.asp?page=XSS"
- * Simple injection from URL, using GET and if exists any vulnerability, exploit a DoS (Denegation Of Service):
- xsser -u "https://target.com" -g "/news.asp?page=XSS"
- * Multiple injections to multiple places, extracting targets from a File, applying automatic payloading, changing timeout to "20" and using multithreads (5 threads), increasing delay between requests to 10 seconds, injecting parameters in HTTP USer-Agent, HTTP Referer and Cookies, using proxy Tor, with IP Octal obfuscation, with statistics results and using verbose mode (real player mode!):
- xsser -i "list_of_url_targets.txt"
- * Injection of a XSS code provided by user on a -fake- image (ready to be uploaded to your public profile):<br><br>
- xsser
- * Report dorking search (using all search engines) to a XML file:
- xsser -d "login.php"
- * Create a malicious Flash movie :
- xsser
- * Send a pre-checking hash to search for false -false positives-:
- xsser -u "https://target.com"
- * Discover parameters filtered on your target using heuristics:
- xsser -u "https://target.com"
- * Exploiting Base64 code encoding in META tag (rfc2397), just after inject a manual payload:
-
- xsser -u "https://target.com" -g "/index.php?id=XSS"
- * Exploiting your "own" -remote code- after discover a vulnerability using automatic fuzzing:<br><br>
-
- xsser -u "https://target.com" -g "/index.php?id=XSS"
- * Apply Anti-antiXSS bypassers (ex: Imperva) before to inject you -own- code with verbose output:
- xsser -u "https://target.com" -g "/index.php?id=XSS"
- * Search also "XSSer" on the Internet for more videos and tutorials...
- [...]
|