📚 OpenRCE is preserved as a read-only archive. Launched at RECon Montreal in 2005. Registration and posting are disabled.








Flag: Tornado! Hurricane!

Blogs >> mandingo's Blog

Created: Tuesday, November 27 2007 04:17.40 CST Modified: Tuesday, November 27 2007 04:20.41 CST
Printer Friendly ...
XSS Check v1.0
Author: mandingo # Views: 7593

XSS_Check may allow us to detect potentially "Cross-Site Scripting" (XSS) vulnerable URLs.

Help

The current version of "XSS_Check" showns the following help:

xss_check.pl v1.0 (C) Copyleft 2007 - By Mandingo at http://www.yoire.com    

Usage: perl xss_check.pl <url|-i <file>> [postData] [OPTIONS]

Overview:

XSS_Check performs various Cross-Site Scripting (XSS) against provided URLs in order to detect this kind of vulnerability.

It's possible to pass an URL as first parameter in commandline, or a list of URLs using the option -i <file>                                          


Options:          

    -x server      Check XSS using a proxy server
    -c cookie      Use this cookie on connections
    -o file        Output results to XML file
    -i file        Read URLs from file
    -v            Verbose output
    -h            This help


Usage examples

Example 1, detecting XSS in a single URL:

./xss_check.pl http://testasp.acunetix.com/Search.asp?tfsearch=

[f] http://testasp.acunetix.com/Search.asp?tfsearch="'>XSS_HERE
[f] http://testasp.acunetix.com/Search.asp?tfsearch=<H1>XSS_HERE</H1>

Example 2, detecting XSS in a single URL, the option "-v" will shown all the requests done:

./xss_check.pl http://testasp.acunetix.com/Search.asp?tfsearch= -v

[f] http://testasp.acunetix.com/Search.asp?tfsearch="'>XSS_HERE
[-] http://testasp.acunetix.com/Search.asp 'tfsearch="'>XSS_HERE'
[-] http://testasp.acunetix.com/Search.asp?tfsearch="'%253EXSS_HERE
[-] http://testasp.acunetix.com/Search.asp 'tfsearch="'%253EXSS_HERE'
[f] http://testasp.acunetix.com/Search.asp?tfsearch=<H1>XSS_HERE</H1>
[-] http://testasp.acunetix.com/Search.asp 'tfsearch=<H1>XSS_HERE</H1>'
[-] http://testasp.acunetix.com/Search.asp?tfsearch=%253CH1%253EXSS_HERE%253C/H1%253E
[-] http://testasp.acunetix.com/Search.asp 'tfsearch=%253CH1%253EXSS_HERE%253C/H1%253E'

Example 3: Detecting XSS using an input file with URLs

./xss_check.pl -i checks.txt

[f] http://testphp.acunetix.com/guestbook.php 'text=<H1>XSS_HERE</H1>&submit=add message&name=anonymous user'
[f] http://testphp.acunetix.com/guestbook.php 'name=anonymous user<H1>XSS_HERE</H1>&text=&submit=add message'
[f] http://testphp.acunetix.com/showimage.php?file=.%2Fpictures%2F1.jpg<H1>XSS_HERE</H1>
[f] http://testphp.acunetix.com/showimage.php?file=.%2Fpictures%2F1.jpg<H1>XSS_HERE</H1>&size=160
[f] http://testphp.acunetix.com/userinfo.php 'uname="'>XSS_HERE&pass='
[f] http://testphp.acunetix.com/userinfo.php 'uname=<H1>XSS_HERE</H1>&pass='

Where "checks.txt" is a text file with the following URLs:

http://testphp.acunetix.com/artists.php?artist=1
http://testphp.acunetix.com/comment.php?aid=1
http://testphp.acunetix.com/guestbook.php 'text=&submit=add message&name=anonymous user'
http://testphp.acunetix.com/listproducts.php?cat=1
http://testphp.acunetix.com/product.php?pic=1
http://testphp.acunetix.com/redir.php?r=http://www.eclectasy.com/Fractal-Explorer/index.html
http://testphp.acunetix.com/search.php?test=query
http://testphp.acunetix.com/search.php?test=query 'gobutton=go&searchfor='
http://testphp.acunetix.com/showimage.php?file=.%2Fpictures%2F1.jpg
http://testphp.acunetix.com/showimage.php?file=.%2Fpictures%2F1.jpg&size=160
http://testphp.acunetix.com/userinfo.php 'uname=&pass=

Note: The information that should be sent using POST must be enclose between simple quotes.

Download

Download XSS_Check.pl





Add New Comment
Comment:









There are 31,328 total registered users.


Recently Created Topics
[help] Unpacking VMP...
Mar/12
Reverse Engineering ...
Jul/06
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06
Question about memor...
Dec/12


Recent Forum Posts
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow
let 'IDAPython' impo...
sohlow
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit