Professional
This extension sends responses to a locally-running
XSS-Detector server, powered by either Phantom.js and/or Slimer.js
Usage:
Before starting an attack it is necessary to start the XSS-Detector servers.
Navigate to the xss-detector directory and execute the following:
$ phantomjs xss.js &
$ slimerjs slimer.js &
The server will listen by default on port 8093. The server is expecting base64 encoded page responses passed via the http-response, which will be passed via the Burp extender.
Navigate to the xssValidator tab, and copy the value for Grep Phrase. Enter this value within the Burp Intruder grep-match function. Payloads that match this Grep Phrase indicate successful execution of XSS payload.
Examples:
Within the xss-detector directory there is a folder of examples which can be used to test the extenders functionality.
Requires Java version 7
Author |
Author
John Poulin |
---|---|
Version |
Version
1.3.2a |
Rating |
Rating |
Popularity |
Popularity |
Last updated |
Last updated
10 February 2022 |
Estimated system impact |
Estimated system impact
Overall impact: High
Memory
Low
CPU
High
General
Low
Scanner
Medium
|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|
You can view the source code for all BApp Store extensions on our GitHub page. |
|
Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates. |
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.