Finding Automated Cross-site Scripting

Finding Automated Cross-site Scripting

Installing the Tools-

  1. https://github.com/devanshbatham/ParamSpider
  2. https://github.com/hahwul/dalfox

Running the Tools-

  1. python3 paramspider.py -d xyz.com > test.txt
  2. type test.txt | Gxss -p xss| dalfox pipe --mining-dict params.txt



Other Way To Find XSS using GF Tool-

  • echo "target.com" | waybackurls | tee results.txt 
  • cat results.txt | gf xss | sed 's/=.*/=/' | sed 's/URL: //' | tee results1.txt
  • dalfox file results1.txt pipe



Installing the Tools-
  • https://github.com/tomnomnom/gf
  • https://github.com/1ndianl33t/Gf-Patterns
  • https://github.com/KathanP19/Gxss
  • https://github.com/hahwul/dalfox
Installing Gf Tool in Ubuntu- (use root permission)
  • type this in terminal
  • cd go
  • export GOPATH=/root/go
  • echo 'source $GOPATH/src/github.com/tomnomnom/gf/gf-completion.bash' >> ~/.bashrc
  • cp -r $GOPATH/src/github.com/tomnomnom/gf/examples ~/.gf
  • it should be something like this:
  • /root/go/src/github.com/tomnomnom/gf/gf-completion.bash
  • where /root/go is your $GOPATH (it can be different in your case)
Scan Single URL-



Thanks
https://dalfox.hahwul.com/docs/home/




Comments

Popular posts from this blog

Polaris’ Intellect Core Banking Software Version 9.7.1- Open Redirect [CVE-2018-14931]

Stored XSS Vulnerability in Hot Scripts Clone:Script Classified Version 3.1-[CVE-2018-7650]

Stored XSS Vulnerability in Bookme Control Panel 2.0-[CVE-2018-8737]