How I found +100 XSS on Private Program


1. Collecting all the domains that are on scope.


2. Running Subfinder and assetfinder and combine the following subdomains in one list and remove duplicates

          subfinder -dL domains.txt -o subfider-subdomains.txt

          cat domain_list.txt | asset finder --subs-only assetfinder-subdomains.txt

          cat subfinder-subdomains.txt assetfinder-subdomains.txt > subdomains.txt

          sort -u subdomains.txt > sort.txt


3. We need to use Httpx to quickly and efficiently identify URLs that return a status code of 200 for a given domain list.

           cat sort.txt ❘ httpx -mc 200 > 200_urls.txt


4. Running Paramspider for crawling all the parameters.

      for URL in $( </root/recon/target/200_urls.txt); do (python3 paramspider.py -d "${URL}");

       done


5. Running KXSS for identifying the filtered, unfiltered Symbols notes that the Kxss scan could take several minutes or longer. Be patient and wait for the scan to complete

          cat filtered_urls.txt | kxss



Some Video Resource 

Automated XSS Finding for Bug bounty hunting: Param Spider, GXSS, Dalfox( Click)


Reflected XSS using paramspider, kxss, dalfox (Click)

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.