This extension sends responses to a locally-running XSS-Detector server, powered by either Phantom.js and/or Slimer.js
Before starting an attack it is necessary to start the XSS-Detector servers. Navigate to the xss-detector directory and execute the following:
$ phantomjs xss.js &
$ slimerjs slimer.js &
The server will listen by default on port 8093. The server is expecting base64 encoded page responses passed via the http-response, which will be passed via the Burp extender.
Navigate to the xssValidator tab, and copy the value for Grep Phrase. Enter this value within the Burp Intruder grep-match function. Payloads that match this Grep Phrase indicate successful execution of XSS payload.
Within the xss-detector directory there is a folder of examples which can be used to test the extenders functionality.
Requires Java version 7
|Last updated||25 January 2017|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|You can view the source code for this BApp by visiting our GitHub page.|
|Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates.|
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.