Skip to content
kleiton0x00 edited this page Oct 18, 2020 · 8 revisions

How can XSScope be used in Bug Hunting?

Simply copy and paste the generated XSS payloads into the vulnerable website. It couldn't be much easier. XSScope aims for all kinds of XSS (DOM, Stored, Reflected and Blind XSS).

How good is the sustainability?

While sending the HTML payload to the victim, remember to keep xsscope.py running, otherwise the IP and Port (used for Portforwading) will be generated with a new one. If you want to rerun the script, be aware that you will lose the connections you currently/might have.

What is Beacon interval?

When user(s) get infected, they will not do anything but pinging every x seconds to the attacker's payload (xsscope.js) and wait for attack orders. No exploit/attack will be performed during this time. The TCP Beacon is an time-based binding of attacker payload. A bind payload is victim who waits for an attack from its controller every x seconds.
Example: If you set Beacon Interval to 40000 ms, the infected victim will ping every 40 seconds to the attacker's payload. If the attacker plans to (in this case: grab a screenshot), the victim will execute the attack order after 40 seconds.

Do I have to rerun XSScope if I want to apply changes in Agent Module Payload?

No, you don't need to. If you want to apply new changes to Agent Module Payload (xsscope.js), simply reopen Agent Module Tab, click the desired features and Build the payload again. This can be done without the need of closing the software and reopening it.