Methodology
Methodology
Methodology
  • 🧑‍🏫My Methodologies
  • 🕶️Google Dorks
  • 🌀Possible "Content-Type" Header values
  • 📜Scripts written by me for XSS
  • 🔼Subdomain Takeover
  • ✍️Tips and Write-ups
  • 🔧Tools and their Uses
  • 🎯XSS nuclei template CVE-2023-24488.yaml
  • 🕵️Recon strategies by other Hackers
    • 🔎Blind SQL Injection Detection and Exploitation (Cheat Sheet)
    • 🔎How i got more than 100 vulnerabilities in just one site? (zseano-challenge)
    • 🔎JS is l0ve ❤️.
    • 🔎My top 5 bookmarks that I consistently use for bug bounty and penetration testing.
    • 🔎Find the treasure hidden inside JavaScript
    • 🔎Deep-Subdomains-Enumeration-Methodology
    • 🔎Extensive Recon Guide For Bug Hunting
    • 🔎Finding Time Based SQLi injections : Edition 2023
    • 🔎From Self XSS to Account Take Over(ATO)
    • 🔎How I hacked NASA and got 8 bugs ?
    • 🔎How I was able to find 4 Cross-site scripting (XSS) on vulnerability disclosure program ?
    • 🔎Leakage of credential data for full control over the target.
    • 🔎Recon Like a Boss
    • 🔎Recon With Me
    • 🔎Simple Recon Methodology
    • 🔎SQL injection through HTTP headers
    • 🔎How to Get Unique Subdomains on Large scope
    • 🔎Static Analysis of Client-Side JavaScript for pen testers and bug bounty hunters
  • 🎯subdomain-enumeration
  • 🛠️CRLF
  • ❌xss
  • ⛴️Ghetto XSS Cheatsheet
  • 🚀Oneliners
Powered by GitBook
On this page
  • Get Parameter as much as possible
  • Run XSS fuzzer
  • dalfox usage:
  • another technique to find XSS
  • Custom useful XSS Attack Vectors

xss

Get Parameter as much as possible

  1. https://github.com/devanshbatham/ParamSpider

  2. gospider -S tageturls.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -e "code-200" | awk '{print $5}'|grep "=" | qsreplace -a | dalfox pipe -o result.txt

  3. Waybackurls | gau

  4. https://github.com/s0md3v/Arjun

  5. https://github.com/hakluke/hakrawler

  6. https://github.com/PortSwigger/param-miner

Combine all in a file and remove duplicates.

Run XSS fuzzer

  1. https://github.com/s0md3v/XSStrike

  2. https://github.com/hahwul/dalfox

Resources:

  • https://blog.yeswehack.com/yeswerhackers/parameter-discovery-quick-guide-to-start/

  • https://infosecwriteups.com/tale-of-my-first-xss-27f622bc47c0


dalfox usage:

gf xss domain.txt | grep -Eo 'https?://[^\"]+' > domain.txt
dalfox file domain.txt -w 20 --silence

another technique to find XSS

  • Scrape all urls from the domain using gau

  • then sort the result using grep command: cat url.txt | grep “utm_”

  • do testing

resources:

  • https://santoshdbobade.medium.com/how-i-got-reflected-cross-site-scripting-rxss-on-manchester-metropolitan-university-700b36cb4f53


Custom useful XSS Attack Vectors

testing"><img/src=x onerror=alert(/XSS/)//
testing'-alert(2)-'xss

Encoding Bypass:

Deface XSS Templates:

PreviousCRLFNextGhetto XSS Cheatsheet

Last updated 24 days ago

❌
https://d3adend.org/xss/ghettoBypass
Script Deface Downloader
Logo