Using Burp Suite - Brute Force payloads using XSS Validator(Extension) | Shahul Hameed

XSS Brute Force Payloads using Burp Suite 

Step 1: Get the parameter variable from the scope URL.


Step 2: Intercept the parameter value using the burp suite application as shown in the below screenshot.


Step 3: Clear and add the variable position which goes to perform an attack on the brute force of XSS payloads.


Step 4: Install xssValidator extension in the burp suite and we can also add custom payloads in the below payloads box.

Step 5: Set the following options in the Payloads option.

Step 6: In Intruder clear, the Grep-Match and Grep-Payloads checked option search responses for payload strings.



Step 7: Copy the grep phase from xssValidator and paste it into the intruder grep-match.



Step 8: Unchecked the option from the payload encoding.

Step 9: Start the attack and check the results with the grep value is 1 manually in the web browser which exploited the XSS attack payload.






Comments

Popular posts from this blog

Janus Vulnerability Exploitation

SQL Basics | Shahul Hameed