Page 73 - Hands-On Bug Hunting for Penetration Testers
P. 73

Unsanitized Data – An XSS Case Study                                 Chapter 4

            The easiest way to download the XSS Validator Burp extension is through the Bapp store.
            Just navigate to the store from the Extension tab within Burp Suite and select the extension
            from the marketplace (needless to say, it's free). You can also install the extension manually
            by following the instructions in the XSS Validator GitHub documentation.

            In addition to installing the extension, during your actual testing, you'll need to run the
            server parsing incoming Burp requests. If you clone the XSS Validator git repo, you can
            navigate to the YTT WBMJEBUPS directory and start the YTT KT script. You can then
            bootstrap the server and set it to run as a detached background process in one easy line:

                QIBOUPNKT YTT KT

            With the XSS Validator server and Burp Suite running (CPPTUSBQ@CVSQ), navigate to the
            specific form input you'd like to test for XSS. As a way of demonstrating the tool on a
            proven testing ground, we're going to test a form input on the Web Scanner Test Site
            (XFCTDBOUFTU DPN) that's been designed to be susceptible to XSS:































            After arriving on the page d with our Burp Proxy Intercept feature turned off so that we
            don't have to manually forward all the traffic on the way there d we enter something
            recognizable into the form fields we're testing:






                                                    [ 58 ]
   68   69   70   71   72   73   74   75   76   77   78