- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 214字
- 2021-07-16 17:53:14
Payload Processing
Here you'll want to add a rule, choosing Invoke Burp extension as the rule type and then XSS Validator as the processor:

After you've made all these selections, your app's GUI should look like the following:

We need to make one more setting change before we can start our attack. If you head over to the xssValidator tab, you'll see a random string generated in the Grep Phrase field, and you might also spot the bullet point explaining that Successful attacks will be denoted by the presence of the Grep Phrase:

We want to add that grep phrase into the Grep - Match section in the Options tab so that, when we're viewing our attack results, we can see a checkbox indicating whether our phrase turned up in an attack response:

Once that phrase has been added, we're ready to start our attack. Click the start attack button in the top-right of the Options (and every other) view.
After clicking the button, you should see an attack window pop up and start to self-populate with the results of the XSS snippet submissions:

And voila! We can see the presence of our grep phrase, meaning that our submissions have been a success, for several of the tag/attribute combinations generated by the XSS Validator submissions.
- Android應(yīng)用安全實(shí)戰(zhàn):Frida協(xié)議分析
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- 數(shù)字安全藍(lán)皮書:本質(zhì)屬性與重要特征
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- 數(shù)據(jù)安全領(lǐng)域指南
- 解密數(shù)據(jù)恢復(fù)
- 先進(jìn)云安全研究與實(shí)踐
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- Mastering Python for Networking and Security
- Mastering Linux Security and Hardening
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- Instant OSSEC Host-based Intrusion Detection System