zoukankan      html  css  js  c++  java
  • XSS检测工具 X5S/fiddler

    x5s

    http://xss.codeplex.com/

    5s是fiddler的插件, 协助XSS脚本攻击的穿刺性测试。  需要手动驱动。 安全编码,unicode字符变形,ut-8编码。

    5s is a Fiddler addon which aims to assist penetration testers in finding cross-site scripting vulnerabilities. This is not a point and shoot tool, it requires some understanding of how encoding issues lead to XSS, and it requires manual driving. See the Quickstart Tutorial to jump right in but be ready to do a little work. It's main goal is to help you identify the hotspots where XSS might occur by:

      • Detecting where safe encodings were not applied to emitted user-inputs
      • Detecting where Unicode character transformations might bypass security filters
      • Detecting where non-shortest UTF-8 encodings might bypass security filters

    下载安装

    从如下地址下载,下载文件X5Setup.msi, 并安装后, 打开fiddler,在左侧就能看到x5s tab页。

    http://xss.codeplex.com/releases/view/43170

    配置运行

    http://xss.codeplex.com/documentation

    第八步骤, 使用IE safari 或者 chrome, 点击需要测试的提交点, fiddler x5s会捕捉到提交的http请求,并按照其定制的策略,对各个参数逐个测试其转码安全性。

    然后在result tab页中, 查看测试结果, 可以使用hotspot来过滤需要重点关注的。

    To get up and running quickly:

      1. Start Fiddler, and select the x5s tab.
      2. Check Enable to start capturing page metadata.
      3. Enter a Preamble, or use the default - this must be a unique string x5s can use to identify its payload in the response, for example "pqz" or "test321"
      4. Enable Domain Targeting to restrict testing to a particular domain, i.e., the site you'd like to test.
      5. Select each of the auto-injection options you want (e.g. select auto-inject into GET, POST, and Other)
      6. Leave the advanced filter disabled for now
      7. Enable the injection characters you'd like to test through the 'Test Case Configuration' tab.
      8. Browse the site you're testing. x5s will work its magic.
      9. Click the 'Results' tab to review any issues discovered by the tool.
      10. If you don't feel like trying to make sense of the results, just click the 'show hotspots' button and review any that show up.
  • 相关阅读:
    问题解决:访问自己搭建网页时出现:此地址使用了一个通常用于网络浏览以外的端口。出于安全原因,Firefox 取消了该请求。
    cracer教程5----漏洞分析(下)
    cracer教程3----信息收集
    linux3
    pwdump7的用法及其hash值解密
    maven scope含义的说明
    Spark2.0协同过滤与ALS算法介绍
    Jmeter压力测试工具安装及使用教程
    过滤器(Filter)与拦截器(Interceptor )区别
    @Value()读取配置文件属性,读出值为null的问题
  • 原文地址:https://www.cnblogs.com/lightsong/p/4295603.html
Copyright © 2011-2022 走看看