xsser帮助文档
帮助信息
└─$ xsser --help 2 ⨯
Usage:
xsser [OPTIONS] [--all <url> |-u <url> |-i <file> |-d <dork> (options)|-l ] [-g <get> |-p <post> |-c <crawl> (options)]
[Request(s)] [Checker(s)] [Vector(s)] [Anti-antiXSS/IDS] [Bypasser(s)] [Technique(s)] [Final Injection(s)] [Reporting] {Miscellaneous}
Cross Site "Scripter" is an automatic -framework- to detect, exploit and
report XSS vulnerabilities in web-based applications.
xsser是一个自动框架,用于探测、利用和报告基于web应用的xss漏洞。
Options:
操作:
--version show program's version number and exit
查看程序的版本号并退出
-h, --help show this help message and exit
查看帮助信息并退出
-s, --statistics show advanced statistics output results
查看高级的统计输出结果
-v, --verbose active verbose mode output results
激活冗长模式输出结果
--gtk launch XSSer GTK Interface
发射xsser getk接口
--wizard start Wizard Helper!
开启向导助手
*Special Features*:
特点
You can set Vector(s) and Bypasser(s) to build complex scripts for XSS
code embedded. XST allows you to discover if target is vulnerable to
'Cross Site Tracing' [CAPEC-107]:
你能设置Vector和Bypasser来构建完成脚本为了xss代码嵌入。XST允许你覆盖,如果目标是跨站点跟踪漏洞
--imx=IMX IMX - Create an image with XSS (--imx image.png)
创建一个xss图像
--fla=FLASH FLA - Create a flash movie with XSS (--fla movie.swf)
创建一个xss的flash动画
--xst=XST XST - Cross Site Tracing (--xst http(s)://host.com)
跨站点跟踪
*Select Target(s)*:
选择目标
At least one of these options must to be specified to set the source
to get target(s) urls from:
最少选择其中一个选项,必须指定设置源以获取目标url
--all=TARGET Automatically audit an entire target
自动审计一个整体的目标
-u URL, --url=URL Enter target to audit
输入目标用于审计
-i READFILE Read target(s) urls from file
读取文件中的目标url
-d DORK Search target(s) using a query (ex: 'news.php?id=')
使用查询搜索目标
-l Search from a list of 'dorks'
从一个dorks列表搜索
--De=DORK_ENGINE Use this search engine (default: DuckDuckGo)
使用该搜索引擎,默认是DuckDuckGo
--Da Search massively using all search engines
使用所有搜索引擎大规模搜索
*Select type of HTTP/HTTPS Connection(s)*:
选择http/https连接类型
These options can be used to specify which parameter(s) we want to use
as payload(s). Set 'XSS' as keyword on the place(s) that you want to
inject:
这些选项能够用于指定我们希望使用的payload参数,设置XSS作为关键在你希望注入的点
-g GETDATA Send payload using GET (ex: '/menu.php?id=XSS')
使用GET方法发送payload
-p POSTDATA Send payload using POST (ex: 'foo=1&bar=XSS')
使用POST方法
-c CRAWLING Number of urls to crawl on target(s): 1-99999
爬取的目标的url数
--Cw=CRAWLER_WIDTH Deeping level of crawler: 1-5 (default: 2)
爬取深度
--Cl Crawl only local target(s) urls (default: FALSE)
仅在本地目标url爬取
*Configure Request(s)*:
设置请求
These options can be used to specify how to connect to the target(s)
payload(s). You can choose multiple:
这些选项能用于指定如何连接目标payload,你能选择多重的:
--head Send a HEAD request before start a test
在测试前使用一个HEAD请求
--cookie=COOKIE Change your HTTP Cookie header
设置cookie
--drop-cookie Ignore Set-Cookie header from response
忽视响应中的Set-Cookie头
--user-agent=AGENT Change your HTTP User-Agent header (default: SPOOFED)
改变HTTP中User-Agent头部
--referer=REFERER Use another HTTP Referer header (default: NONE)
使用另一个HTTP referer头部
--xforw Set your HTTP X-Forwarded-For with random IP values
设置X-Forwarded-For,带一个随机的ip
--xclient Set your HTTP X-Client-IP with random IP values
--headers=HEADERS Extra HTTP headers newline separated
--auth-type=ATYPE HTTP Authentication type (Basic, Digest, GSS or NTLM)
--auth-cred=ACRED HTTP Authentication credentials (name:password)
--check-tor Check to see if Tor is used properly
--proxy=PROXY Use proxy server (tor: http://localhost:8118)
--ignore-proxy Ignore system default HTTP proxy
--timeout=TIMEOUT Select your timeout (default: 30)
--retries=RETRIES Retries when connection timeout (default: 1)
--threads=THREADS Maximum number of concurrent requests (default: 5)
--delay=DELAY Delay in seconds between each request (default: 0)
--tcp-nodelay Use the TCP_NODELAY option
--follow-redirects Follow server redirections (default: FALSE)
--follow-limit=FLI Set limit for redirection requests (default: 50)
*Checker Systems*:
These options are useful to know if your target is using filters
against XSS attacks:
--hash Send a hash to check if target is repeating content
--heuristic Discover parameters filtered by using heuristics
--discode=DISCODE Set code on reply to discard an injection
--checkaturl=ALT Check reply using: <alternative url> [aka BLIND-XSS]
--checkmethod=ALTM Check reply using: GET or POST (default: GET)
--checkatdata=ALD Check reply using: <alternative payload>
--reverse-check Establish a reverse connection from target to XSSer
*Select Vector(s)*:
These options can be used to specify injection(s) code. Important if
you don't want to inject a common XSS vector used by default. Choose
only one option:
--payload=SCRIPT OWN - Inject your own code
--auto AUTO - Inject a list of vectors provided by XSSer
*Select Payload(s)*:
These options can be used to set the list of vectors provided by
XSSer. Choose only if required:
--auto-set=FZZ_NUM ASET - Limit of vectors to inject (default: 1293)
--auto-info AINFO - Select ONLY vectors with INFO (default: FALSE)
--auto-random ARAND - Set random to order (default: FALSE)
*Anti-antiXSS Firewall rules*:
These options can be used to try to bypass specific WAF/IDS products
and some anti-XSS browser filters. Choose only if required:
--Phpids0.6.5 PHPIDS (0.6.5) [ALL]
--Phpids0.7 PHPIDS (0.7) [ALL]
--Imperva Imperva Incapsula [ALL]
--Webknight WebKnight (4.1) [Chrome]
--F5bigip F5 Big IP [Chrome + FF + Opera]
--Barracuda Barracuda WAF [ALL]
--Modsec Mod-Security [ALL]
--Quickdefense QuickDefense [Chrome]
--Sucuri SucuriWAF [ALL]
--Firefox Firefox 12 [& below]
--Chrome Chrome 19 & Firefox 12 [& below]
--Opera Opera 10.5 [& below]
--Iexplorer IExplorer 9 & Firefox 12 [& below]
*Select Bypasser(s)*:
These options can be used to encode vector(s) and try to bypass
possible anti-XSS filters. They can be combined with other techniques:
--Str Use method String.FromCharCode()
--Une Use Unescape() function
--Mix Mix String.FromCharCode() and Unescape()
--Dec Use Decimal encoding
--Hex Use Hexadecimal encoding
--Hes Use Hexadecimal encoding with semicolons
--Dwo Encode IP addresses with DWORD
--Doo Encode IP addresses with Octal
--Cem=CEM Set different 'Character Encoding Mutations'
(reversing obfuscators) (ex: 'Mix,Une,Str,Hex')
*Special Technique(s)*:
These options can be used to inject code using different XSS
techniques and fuzzing vectors. You can choose multiple:
--Coo COO - Cross Site Scripting Cookie injection
--Xsa XSA - Cross Site Agent Scripting
--Xsr XSR - Cross Site Referer Scripting
--Dcp DCP - Data Control Protocol injections
--Dom DOM - Document Object Model injections
--Ind IND - HTTP Response Splitting Induced code
*Select Final injection(s)*:
These options can be used to specify the final code to inject on
vulnerable target(s). Important if you want to exploit 'on-the-wild'
the vulnerabilities found. Choose only one option:
--Fp=FINALPAYLOAD OWN - Exploit your own code
--Fr=FINALREMOTE REMOTE - Exploit a script -remotely-
*Special Final injection(s)*:
These options can be used to execute some 'special' injection(s) on
vulnerable target(s). You can select multiple and combine them with
your final code (except with DCP exploits):
--Anchor ANC - Use 'Anchor Stealth' payloader (DOM shadows!)
--B64 B64 - Base64 code encoding in META tag (rfc2397)
--Onm ONM - Use onMouseMove() event
--Ifr IFR - Use <iframe> source tag
--Dos DOS - XSS (client) Denial of Service
--Doss DOSs - XSS (server) Denial of Service
*Reporting*:
--save Export to file (XSSreport.raw)
--xml=FILEXML Export to XML (--xml file.xml)
*Miscellaneous*:
--silent Inhibit console output results
--alive=ISALIVE Set limit of errors before check if target is alive
--update Check for latest stable version