Skip to content

R3DHULK/xss-vulnerability-finder-in-ruby

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

XSS Vulnerability Finder In Ruby

Check Out The Tool 👇

Alt text

🔴 Disclaimer : Author Of This Tool Is Not Responsible For Any Harmful Activities.

So What Is XSS?

Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application. It allows an attacker to circumvent the same origin policy, which is designed to segregate different websites from each other. Cross-site scripting vulnerabilities normally allow an attacker to masquerade as a victim user, to carry out any actions that the user is able to perform, and to access any of the user's data. If the victim user has privileged access within the application, then the attacker might be able to gain full control over all of the application's functionality and data.

How does XSS work?

Cross-site scripting works by manipulating a vulnerable web site so that it returns malicious JavaScript to users. When the malicious code executes inside a victim's browser, the attacker can fully compromise their interaction with the application.

xss-vul

XSS Proof Of Concept

You can confirm most kinds of XSS vulnerability by injecting a payload that causes your own browser to execute some arbitrary JavaScript. It's long been common practice to use the alert() function for this purpose because it's short, harmless, and pretty hard to miss when it's successfully called. In fact, you solve the majority of our XSS labs by invoking alert() in a simulated victim's browser.

Unfortunately, there's a slight hitch if you use Chrome. From version 92 onward (July 20th, 2021), cross-origin iframes are prevented from calling alert(). As these are used to construct some of the more advanced XSS attacks, you'll sometimes need to use an alternative PoC payload. In this scenario, we recommend the print() function. If you're interested in learning more about this change and why we like print(), check out our blog post on the subject.

As the simulated victim in our labs uses Chrome, we've amended the affected labs so that they can also be solved using print(). We've indicated this in the instructions wherever relevant.

Types Of XSS Attacks

There are three main types of XSS attacks. These are:
💀 Reflected XSS, where the malicious script comes from the current HTTP request.
💀 Stored XSS, where the malicious script comes from the website's database.
💀 DOM-based XSS, where the vulnerability exists in client-side code rather than server-side code.

Git Installation

# Update And Upgrade System
sudo apt update && sudo apt upgrade -y

# Install Git
sudo apt install git 

# Install Ruby
sudo apt install ruby

# Clone My Repo
git clone https://github.com/R3DHULK/xss-vulnerability-finder-in-ruby

# Change Directory
cd xss-vulnerability-finder-in-ruby

# Run
ruby xss-vulnerability-scanner.rb

🔴 Note: This Is Just A Basic Tool. In Real World XSS Vulnerabilities Are Too Crtitical To Find.

Show Support 👇👇👇

https://www.buymeacoffee.com/r3dhulk