AUTOMATED SCRIPT FOR FINDING XSS

 AUTOMATED SCRIPT FOR FINDING XSS 

             An example of a web security vulnerability is cross-site scripting (XSS), which enables attackers to insert malicious executable scripts into the code of a website or application that is trusted. An XSS attack is frequently started by an attacker tempting a user to click on a malicious link that they deliver to them. Through cross-site scripting (XSS) assaults, attackers can get around access restrictions like the same-origin policy, which separates websites from one another.Zero When the victim accesses the website or application that runs the malicious code, the attack really takes place.1. Malicious scripts are injected into websites that are otherwise trustworthy and benign in an exploit known as cross-site scripting (XSS).


HERE IS THE SCRIPT THAT AUTOMATES XSS DETECTION 

cat urls.txt|egrep -iv ".(jpg|jpeg|js|cs|gif|tiff|png|woff|woff2|ico|pdf|svg|txt)" |qsreplace ' "><()'|tee combinedfuzz.json && cat combinedfuzz.json|while read host do; do curl --silent --path-as-is --insecure "$host" |grep -qs  "\"><()" && echo -e "$host \033[91m Vulnerable \e[0m \n" || echo -e "$host \033[92m Not Vulnerable \e[0m \n"; done |tee saveitas.txt
  

STEP 1

type nano xxsautomation.txt and copy paste the above script in it and save it 

this is for future reference ,its your wish to save it like this

STEP 2

the screenshot is little different so don't be confuse yourself use the above syntax 

STEP 3

create a nano urls.txt and store the links you wanna check ,like mentioned below


STEP 4

finally run this on terminal 

you will get output has mentioned below 



if its vulnerable it shows VULNERABLE or else it shows NOT VULNERABLE








Comments

Popular posts from this blog

PlayItSafe google cyber security professional course 2 (COURSERA)

FOUNDATIONS OF CYBERSECURITY GOOGLE(COURSERA) QUIZ ANSWERS

HOW TO BYPASS THE 2FA(TWO FACTOR AUTHENTICATION)

how hackers do a phishing page in 8 lines of code using html

BEGINNER BUG BOUNTY TOOLS PART-1

Disclaimer

Privacy policy

BITFLIPING

Things should do after sublister(sublist3r)