- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 214字
- 2021-07-16 17:53:14
Payload Processing
Here you'll want to add a rule, choosing Invoke Burp extension as the rule type and then XSS Validator as the processor:

After you've made all these selections, your app's GUI should look like the following:

We need to make one more setting change before we can start our attack. If you head over to the xssValidator tab, you'll see a random string generated in the Grep Phrase field, and you might also spot the bullet point explaining that Successful attacks will be denoted by the presence of the Grep Phrase:

We want to add that grep phrase into the Grep - Match section in the Options tab so that, when we're viewing our attack results, we can see a checkbox indicating whether our phrase turned up in an attack response:

Once that phrase has been added, we're ready to start our attack. Click the start attack button in the top-right of the Options (and every other) view.
After clicking the button, you should see an attack window pop up and start to self-populate with the results of the XSS snippet submissions:

And voila! We can see the presence of our grep phrase, meaning that our submissions have been a success, for several of the tag/attribute combinations generated by the XSS Validator submissions.
- Extending Symfony2 Web Application Framework
- 深入淺出隱私計算:技術解析與應用實踐
- Web安全與攻防入門很輕松(實戰超值版)
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- Getting Started with FortiGate
- 數據安全實踐指南
- 網絡安全技術與實訓(第4版)(微課版)
- 人工智能安全(精裝版)
- Learning Pentesting for Android Devices
- VMware vCloud Security
- Mastering Metasploit
- 密碼朋克:自由與互聯網的未來
- 深入探索區塊鏈
- 大數據時代的智慧城市與信息安全
- 從實踐中學習TCP/IP協議