Ikhaya » Amathuluzi e-Linux » Xsstrike – Ukutholwa okuthuthukile kwe-XSS | Isifundo Esigcwele!

Xsstrike – Ukutholwa okuthuthukile kwe-XSS | Isifundo Esigcwele!

nge I-Suyash
xsstrike

Xsstrike ngokoqobo kwenza ukutholwa kwe-XSS kube lula kakhulu!

Ithuluzi elisebenziseka kakhulu umuntu angalisebenzisa.

Yini i-xsstrike?

Xsstrike iyithuluzi lokubhala esinqamulweni sendawo.

Ihlinzekwa ngama-parsers amane abhalwe ngesandla, Umholo obhalwe ngobuhlakani, Injini enhle ethokozisayo, kanye nomkhakha osheshayo osheshayo.

Xsstrike Ngokungafani namanye amathuluzi awafaki ama-payloads.

Esikhundleni salokho isebenzisa ama-parsers ezenziwe ngezandla ukuze ahlole izimpendulo ezahlukahlukene zewebhu.

Futhi, Kungaskena kwe-DOM XSS.

Ingakhasa futhi, umnyatheliso weminwe, kanye ne-fuzz wafs.

Ithuluzi lidinga Python 3.4+ ukusebenza.

Ngaphezu kwalokho, Ixhasa i-Linux, Inzi, kanye neWindows Windows.


Ukukhetha komhleli:


Izithombe ezivelele ze-XSstrike:

  • Ukuhlaziywa komongo.
  • Umongo olungisekayo.
  • Ukugeleza komsebenzi okucwaningwe kakhulu.
  • Kuboniswe futhi kuthwetshulwa kwe-DOM XSS.
  • Ukukhasa okuningi.
  • Ukutholwa kwe-waf & ukuhwamuka, I-Waf Fingerprinting.
  • I-HTML eyenziwe ngezandla & JavaScript parser.
  • Injini enamandla enamandla.
  • Intelligent Payload Generator.
  • Qedela ukwesekwa kwe-HTTP.
  • Inikwe amandla yi-Photon, Zetanize, futhi arjun.
  • Ikhodi ebhalwe kahle kanye nezibuyekezo ezijwayelekile.

Ukufaka i-xsstrike:

  1. Cloning git repo.
$ git clone https://github.com/s0md3v/xsstrike.git

2. Ukuhanjiswa kwesikhombisi bese ufaka izidingo:

$ cd xsstrike
$ Faka -R Faka -r Izidingo.txt

3. -Gijima Xsstrike:

$ python xsstrike

Ukusetshenziswa kwe-XSstrike:

Ukufaka uhlu konke okutholakalayo, ukuthayipha--help:

umsebenzi: xsstrike.py [-h] [-i-uget] [--Idatha yedatha] [-TECTS]
                   [--ukunkehlela] [--buyekeza] [--isikhathi siphelile] [--amapharaleki] [--gaqa]
                   [--Yeqa-POC] [--Yeqa-Pliwula] [--izihloko] [-d ukubambezeleka]

Izimpikiswano ezingakhethwa:
  -h, --Siza ukukhombisa lo mlayezo wosizo nokuphuma
  -u, --I-URL Target URL
  - Data yeposi
  -t, --imicu yenombolo yentambo
  -Ku, --Ileveli Yezinga Lokukhasa
  --Fuzzer Fuzzer
  - Vuselela
  - Isikhathi sokuvala
  --params thola amapharamu
  - Crawl ukukhasa
  --Skip-poc yeqa isizukulwane se-poc
  --Skip-DOM SPP SKIP I-DOM Check
  - Ama-Headers engeza izihloko
  -D, --ukubambezeleka ukubambezeleka phakathi kwezicelo

Ungayisebenzisa kanjani ithuluzi le-xsstrike?

Ukusebenzisa leli thuluzi kulula kakhulu.

Udinga nje ukuqonda ezinye zezisekelo ze-Linux.

Ungakhathazeki, Sizokuqondisa ukuthi usisebenzise isinyathelo ngesinyathelo.

1. Ukuskena i-URL eyodwa:

Ukukhetha: -u noma --url

Ukuhlola ikhasi elilodwa lewebhu elisebenzisa indlela yokuthola:

$ python xsstrike.py -u "http://Isibonelo.com/search.php?Q = Umbuzo"

Ukuhlinzeka idatha yeposi:

$ python xsstrike.py -u "http://Isibonelo.com/search.php" --umbhalo "Q = Umbuzo"

2. Enyatela:

Ukukhetha: --crawl

Ukuqala ukukhasa ekhasini lewebhu eliqondiwe, gijima:

$ python xsstrike.py -u "http://Isibonelo.com/Page.php" --gaqa

Ukuthola amapharamitha afihliwe:

Ukukhetha: --params

$ python xsstrike.py -u "http://Isibonelo.com/Page.php" --amapharaleki

3. Yeqa i-poc ne-dom:

Ukukhetha: --skip-poc

$ python xsstrike.py -u "http://Isibonelo.com/search.php?Q = Umbuzo" --Yeqa-POC

Ukukhetha: --skip-dom

$ python xsstrike.py -u "http://Isibonelo.com/search.php?Q = Umbuzo" --Yeqa-Pliwula

Isiphetho:

Xsstrike iyithuluzi elimangalisayo ngempela lokuthola ubungozi be-XSS ezihlelweni zewebhu.

Ungasebenzisa leli thuluzi ukuze kube lula kuwe.

Uma uthandile okuqukethwe kwethu Qiniseka ukuthi ushiya amazwana phansi ngezansi futhi ubonge iqembu lethu. Uma uthola kunzima ukusebenzisa leli thuluzi ungashiya imibuzo yakho ngezansi. Iqembu Cshawk lizothinta maduze nawe.

Shiya Amazwana