Blind XSS:
Sometimes in certain areas example in feedback forms or chat bots we do not have an idea if XSS exists or not, in such a case we will create a payload where the server will give us a response
This can be easily done by using XSSHunter where payloads as well as reports can be easily created
Link: https://xsshunter.com/
Stored XSS:
If a web application stores our payload then such an XSS is called a Stored XSS. Such fields can be found under “My Profile” Section.
DOM XSS
DOM XSS arises due to the fact that input comes from the source and gets executed in the sink.
https://files.cdn.thinkific.com/file_uploads/359809/images/2f6/041/306/1618132420695.jpg
DOM XSS Automated Scanner
Steps:
git clone https://github.com/dwisiswant0/findom-xss.git
git clone https://github.com/GerbenJavado/LinkFinder.git
cd LinkFinder
pip install -r requirements.txt
cd ..
cd findom-xss
nano findom-xss.sh
Change the path of linkfinder
Save and Quit
./findom-xss https://website.com
XSS Mouse Payloads:
Sometimes when keyboard payloads are blocked, we can perform XSS using mouse payloads as developers fail to protect them from being bypassed. Some of the mouse payloads are onmouseover, onmouseclick etc. A list can be found under resources.
XSS Polyglots:
Polyglots means someone who knows many languages. Combining it with XSS Payloads, it basically means a payload combination of 2 or more payloads in order to trick the web server and bypass many input checks.
A list of polyglot payloads can be found : https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/XSS%20Injection/Intruders/XSS_Polyglots.txt
XSS to URL Redirection:
Using an injection point and crafting a specially based payload we can make the victim redirect to an evil website.
The Payload will look something like this:
XSS to Phishing:
Using an injection point and a specially crafted payload of iframe we can trick the user to see a login screen and make the user log in thus phishing the user.
Payload:
XSS to Cookie Stealing:
This technique can increase the severity of XSS. A simple payload where the cookie of user will be redirected to the attacker’s web server.The payload can be as follows:
Where document.cookie will give the victims cookie and document.location.href will send the data to attacker’s web server
XSS via File Upload:
Some web servers do not check the content of the file while uploading them. In such a scenario an attacker can write the payload inside the file and upload the file on the web application thus leading to XSS.
Where web servers only upload image files, using an exiftool we can create a new parameter and add our payload in the value option and then upload the image file to web application thus prompting the alert box
XSS Mitigations:
Input Sanitization
Encode all input characters
Usage of WAF
Filter Input on Arrival
Encode data on output
Use appropriate response headers
Content Security Policy
ParamSpider:
A tool which can find hidden parameters on a website. The tool can be installed from https://github.com/devanshbatham/ParamSpider
Steps:
$ git clone https://github.com/devanshbatham/ParamSpider
$ cd ParamSpider
$ pip3 install -r requirements.txt
$ python3 paramspider.py --domain hackerone.com
$3133.7 Google Bug Bounty Writeup- XSS Vulnerability!:
https://www.pethuraj.com/blog/google-bug-bounty-writeup/
Best wishes,
Rohit Gautam & Shifa Cyclewala