官术网_书友最值得收藏!

Payload Processing

Here you'll want to add a rule, choosing Invoke Burp extension as the rule type and then XSS Validator as the processor:

After you've made all these selections, your app's GUI should look like the following:

We need to make one more setting change before we can start our attack. If you head over to the xssValidator tab, you'll see a random string generated in the Grep Phrase field, and you might also spot the bullet point explaining that Successful attacks will be denoted by the presence of the Grep Phrase:

We want to add that grep phrase into the Grep - Match section in the Options tab so that, when we're viewing our attack results, we can see a checkbox indicating whether our phrase turned up in an attack response:

Once that phrase has been added, we're ready to start our attack. Click the start attack button in the top-right of the Options (and every other) view.

After clicking the button, you should see an attack window pop up and start to self-populate with the results of the XSS snippet submissions:

And voila! We can see the presence of our grep phrase, meaning that our submissions have been a success, for several of the tag/attribute combinations generated by the XSS Validator submissions.

主站蜘蛛池模板: 顺平县| 湘乡市| 讷河市| 闵行区| 宝丰县| 夏津县| 天祝| 昂仁县| 绥阳县| 旬邑县| 望江县| 光泽县| 敖汉旗| 航空| 乡城县| 焦作市| 晋城| 班玛县| 揭东县| 寿光市| 博客| 大英县| 金寨县| 龙海市| 鲜城| 贵溪市| 尼木县| 舒城县| 柳州市| 双江| 永定县| 广东省| 乌拉特后旗| 屯昌县| 晋城| 凉城县| 重庆市| 谢通门县| 柳江县| 丹棱县| 三台县|