This extension sends responses to a locally-running XSS-Detector server, powered by either Phantom.js and/or Slimer.js
Before starting an attack it is necessary to start the XSS-Detector servers. Navigate to the xss-detector directory and execute the following:
$ phantomjs xss.js &
$ slimerjs slimer.js &
The server will listen by default on port 8093. The server is expecting base64 encoded page responses passed via the http-response, which will be passed via the Burp extender.
Navigate to the xssValidator tab, and copy the value for Grep Phrase. Enter this value within the Burp Intruder grep-match function. Payloads that match this Grep Phrase indicate successful execution of XSS payload.
Within the xss-detector directory there is a folder of examples which can be used to test the extenders functionality.
- Bypass-regex.php: This demonstrates a XSS vulnerability that occurs when users attempt to filter input by running it through a single-pass regex.
Requires Java version 7
|Last updated||25 January 2017|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.