Toolsmith Tidbit: XssPy

Datetime:2016-08-22 21:57:50          Topic: XSS Vulnerability  Python           Share

You've likely seen chatter recently regarding the pilot Hack the Pentagon bounty program that just wrapped up, as facilitated by HackerOne . It should come as no surprise that the most common vulnerability reported was cross-site scripting (XSS). I was invited to participate in the pilot, yes I found and submitted an XSS bug, but sadly, it was a duplicate finding to one already reported. Regardless, it was a great initiative by DoD, SecDef, and the Defense Digital Service, and I'm proud to have been asked to participate. I've spent my share of timefinding XSS bugs and had some success , so I'm always happy when a new tool comes along to discover and help eliminate these bugs when responsibly reported.

XssPy is just such a tool.

A description as paraphrased from it's Github page:

XssPy is a Python tool for finding Cross Site Scripting vulnerabilities. XssPy traverses websites to find all the links and subdomains first, then scans each and every input on each and every page discovered during traversal.

XssPy uses small yet effective payloads to search for XSS vulnerabilities.

The tool has been tested in parallel with commercial vulnerability scanners, most of which failed to detect vulnerabilities that XssPy was able to find. While most paid tools typically scan only one site, XssPy first discovers sub-domains, then scans all links.

XssPy includes:

1) Short Scanning

2) Comprehensive Scanning

3) Subdomain discovery

4) Comprehensive input checking

XssPy has discovered cross-site scripting vulnerabilities in the websites of MIT, Stanford, Duke University, Informatica, Formassembly, ActiveCompaign, Volcanicpixels, Oxford, Motorola, Berkeley, and many more.

Install as follows:

git clone /opt/xsspy

Python 2.7 is required and you should have mechanize installed. If mechanize is not installed, type pip install mechanize in the terminal.

Run as follows:

python (no http:// or www).

Let me know what successes you have via email or Twitter and let me know if you have questions (russ at holisticinfosec dot org or @holisticinfosec).

Cheers…until next time.

About List