Offensive Security Tool: XSSRocket
Reading Time: 3 Minutes
XSSRocket
XSSRocket is developed by Chris ‘SaintDruG’ Abou-Chabké from Black Hat Ethical Hacking, and its a tool designed for Offensive Security and XSS (Cross-Site-Scripting) attacks. It uses the Wayback Machine to fetch URLs and filters them based on parameters contained in the URLs. It then filters the URLs with httpx while using multiple Grep and SED patterns to filter only the ones that are alive and valid, removing the contents of the parameters and then uses a remote XSS payload list from Github to send GET requests with the payloads to the filtered URLs injecting them with the XSS Payloads, showcasing the status for 200 and 4XX errors in Red and Green, and creating a Summary for the findings, while saving all the results into a folder that has the same name as the domain name created with all the results, inside it.
It also includes a feature that generates a random Sun Tzu quote for Offensive Security and uses lolcat to display colorful outputs and ASCII art and a check system to ensure that the user is connected to the internet before running it.
What is special about this tool is that technically, is the methodology used and critical thinking behind it for each step that it is doing its action, but also by changing the payload wordlist, you could do more injection based attacks. This means you can modify it, so it can check for SQL Injections, OS Command Injection and so on! – If you do change it, send us a push notification so we can add it! You also get to perform stealth scans by changing the IP before each attack to evade various mechanisms.
See Also: So you want to be a hacker?
Offensive Security and Ethical Hacking Course
Latest Version & Updates
• V2 now supports sending the result by email to any email, you can use your own SMTP credentials in order to setup the configuration by editing the script and adding your details.
• Some tweaks and enhancement in performance
Features
- Supports Stealth Mode using Proxychains, for more reliable attacks against defensive mechanisms
- Automatically fetches URLs from the Wayback Machine
- Filters URLs based on parameters contained in the URLs
- Used httpx to filter only alive URLs and clearing the values for each parameter
- Uses a remote XSS payload list from Github
- Installs all requirements needed depending on the architecture as it gets new updates (Compatible with MacOS, Ubuntu, Debian, Kali)
- Sends GET requests with payload list to URLs
- Detects and reports possible XSS vulnerabilities
- Creates a folder with the domain name to save results
- Prints final message with number of possible vulnerable URLs and a Summary
- Saves result URLs in a file
- Display a random Sun Tzu quote for offensive security
- Check if the user is connected to the internet before running the tool
- Provides a way to append payloads to the URLs
- Output the full URL with payload
This tool with also display a summary feature that displays the total number of possible XSS injections found, along with a list of affected URLs, the payload used, and the response code, at the end.
See Also: Offensive Security Tool: PingRAT
See Also: Offensive Security Tool: Nucleimonst3r
Requirements
- waybackurls: This tool can be installed by running go get github.com/tomnomnom/waybackurls
- cURL: This tool is commonly pre-installed on Kali Linux and Ubuntu, but can be installed by running apt-get install curl on Ubuntu or brew install curl on MacOS
- figlet: This tool can be installed by running apt-get install figlet on Kali Linux or Ubuntu or brew install figlet on MacOS
- lolcat: This tool can be installed by running gem install lolcat
- wget: This tool is commonly pre-installed on Kali Linux and Ubuntu, but can be installed by running apt-get install wget on Ubuntu or brew install wget on MacOS
Installation
git clone https://github.com/blackhatethicalhacking/XSSRocket.git
cd XSSRocket
chmod +x XSSRocket.sh
./XSSRocket.sh
Screenshot
Main Menu
Compatibility
This tool has been tested on Kali Linux, Ubuntu and MacOS.
Payload Wordlist
To change the list of payloads, you can edit the tool and set another URL.
Disclaimer
This tool is provided for educational and research purpose only. The author of this project are no way responsible for any misuse of this tool. We use it to test under NDA agreements with clients and their consents for pentesting purposes and we never encourage to misuse or take responsibility for any damage caused!
Clone the repo from here: GitHub Link