Increasing XSS impact using XSScope

4 years ago 182
BOOK THIS SPACE FOR AD
ARTICLE AD

Kleitonx00

Image for post

Image for post

During Bug Hunting, everyone aims for triggering the “1” alert. However, if you want to escalate your impact of XSS, now you can do this easily by using XSScope.

What is XSScope? XSScope is an advanced XSS payload generator platform for Client-Side attacks and also with an aim of increaing the impact of an XSS during Bug Hunting. Using all modules that XSScope offers, advanced XSS can be simply use with 1–2 click(s).

Github page of XSScope: https://github.com/kleiton0x00/XSScope

I have found a website which is vulnerable to XSS and doesn’t filter any kind of malicious JS code.

First, let’s try injection HTML code.

Image for post

Image for post

We can see that after clicking “search” button, our payload got reflected into HTML code. Now let’s see if we can inject Javascript code. This time, I will enter a Javascript payload.

<script>alert(1)</script>

Image for post

Image for post

Our payload got successfully executed without being filtered and we got our lovely alert trigger.

Go to https://github.com/kleiton0x00/XSScope and clone the project.

git clone https://github.com/kleiton0x00/XSScope
python3 xsscope.py

A GUI software will open, so go to Main -> Add HTML code
A new tab will popup, like in the image below.

Image for post

Image for post

Now click on “Choose Pre-generated HTML code” and click on which website you like to generate a Phishing Clone. In this case, I will choose “Amazon Login Form”. The whole code will be added into the text box automatically, so click Apply Code.

Image for post

Image for post

Now click on Main -> XSS Payloads and a new window will popup.

Image for post

Image for post

There will be 10 payloads ready to be deployed, but I’m copying the first payload since <script>alert(1)</script> worked before.

Paste the payload into the website and the Phishing Website will be displayed.

Generating Amazon Phishing Website using XSS

Now the victim will simply add his credentials into the phishing website.

Image for post

Image for post

The credentials will be stored in /XSScope/login_phishing/credentials/

Image for post

Image for post

Credentials captured

~~ Spying Features ~~

Camera HijackingGet every Entry form value that victim enters in the websiteGrab victim’s cookiesKeylogger

~~ HTML code injection ~~

Generate Phishing Websites with 2 using pregenerated HTML codes such as:
Amazon, Google, Line, LinkedIn, Steam, Twitch, Verizon, WiFi and so on…Generate Website DefaceImport HTML file from external fileAdd your own HTML code

~~ Funny modules ~~

Change every link in the websiteChange every image in the websiteClickjacker (redirect to another URI once user click somewhere on the website)

For any question, please contact me on: kurtikleiton@gmail.com
Happy hacking!

Read Entire Article