Easier XSS payloads using HttpPwnly

Easier XSS payloads using HttpPwnly

Quite often you can find a Cross-Site Scripting (XSS) vulnerability in a web application. The minimal approach is to inject a JavaScript "alert" which says hello or something in there. This can be enough if the customer is familiar with XSS and knows it is a risk they need to fix. If it is the first time that customer has ever heard of it then you need to explain a lot more.

Enter HttpPwnly which was written by my colleague Daniel Forse. A simple web server based application which allows you to use a fast interface to inject your JavaScript commands into a victim's session. It is based on Burp Suite's "Repeater" feature. If you are familiar with that then you will have no problems making HttpPwnly work effectively.

To make it work you need to do the following:

  1. Hook a victim's browser with the HttpPwnly JavaScript file. (Same as BeEf project)
  2. Type JavaScript commands into the request box and send them!

No hidden magic, that is all that needs to be done. You can use the back and forward arrows at the top of the web page to operate exactly like repeater.

This is not going to make an XSS payload for you. You will need to know JavaScript but you now have a simple way to test each iteration of your payload quickly until you get it correct.

I have used this on live engagements for a few months as a tool only available within Pentest Limited. It has helped me to bash out better proof of concept payloads which were appropriately tailored to the specific customer faster than I could before.

Now that it has been published online I am happy to tout this as something that is definitely worth while playing with.

Get it from our GitHub page at the URL below:

https://github.com/PentestLtd/HttpPwnly

Happy proof of concepting!


Nick Jenliffe-Smith

| Hacker | Security Consultant | CCNA

8 年

Sounds great. Can you load a file of java script lets? And let it run one by one until a box is reflected back say? Or is it simply a manual process one by one.?

回复

要查看或添加评论,请登录

Paul Ritchie的更多文章

  • Capture the Flag for December

    Capture the Flag for December

    I am working on a new Capture the Flag (#CTF) challenge for December. It will be called Avalanche2 since it is now the…

    1 条评论
  • Cyber Maturity

    Cyber Maturity

    Bug bounties and ethical disclosures make life easier for everyone (on average) to discuss cyber security as adults…

  • [Tool Release] Git-Fingerprint

    [Tool Release] Git-Fingerprint

    At BSides Glasgow I discussed a lot of ways that you can use "git" to power your penetration testing methodologies. In…

    2 条评论
  • Inaugural "Internet of Things meets Cyber Security" meetup #Scotland

    Inaugural "Internet of Things meets Cyber Security" meetup #Scotland

    I was invited to attend this event last week. I am both extremely glad that I was asked, and that my work commitments…

    1 条评论
  • Impact Assessment 101

    Impact Assessment 101

    When interviewing candidates, who have no previous penetration testing experience, there is often a gap in their…

    7 条评论
  • Want to talk hacker-to-hacker?

    Want to talk hacker-to-hacker?

    For 15 years Pentest Ltd has been delivering effective security assessments for our clients. We are looking for…

社区洞察

其他会员也浏览了