Open CHillyVibes opened 1 year ago
Hi @CHillyVibes Thank you so much for submit issue! I didn't understand the question exactly. Is it a question about false negatives?
Since Dalfox uses different payload combinations, somtimes.. you can also use payloads that require interaction. dalfox try to find an XSS that triggers as soon as it open in browser, preferably, but sometimes it gives me a slightly complicated PoC.
Hi @CHillyVibes Thank you so much for submit issue! I didn't understand the question exactly. Is it a question about false negatives?
Since Dalfox uses different payload combinations, somtimes.. you can also use payloads that require interaction. dalfox try to find an XSS that triggers as soon as it open in browser, preferably, but sometimes it gives me a slightly complicated PoC.
It's about dalfox not showing vulnerabilities at all but I know the router login page is vulnerable to stored xss and reflected xss because I can inject scripts into the web page and execute scripts from the url bar when doing a mitma and visiting from a target device.
It works wonders against websites showing me vulnerabilities and I have even applied xss attacks with vulnerabilities found and they do exploit the web pages correctly. I'm looking for the same finds when targeting a router with the url being ipv4 192.168.1.1
Question
Your questions When I scan a router login page it doesn't show any exploitations availabe but I know that the login page is epxloitable because it is susceptible to XSS during a mitma
Environment
what method is available for me to exploit our given target? thanks dev team btw what parameters would you consider using in order to see the if our payload executed successfully without the url encoding
sudo ./dalfox url http://testphp.vulnweb.com/listproducts.php?cat=1 -b /home/kali/scripts/cookies.js
.' .::::. __ : :::::::: | \ / \ | | | / \ V / : :::::::: | o ) o || | | ( o )) ( '. '::::::' |__/|n||__||| _//n\ '-.::''
🌙🦊 Powerful open source XSS scanning tool and parameter analyzer, utility
🎯 Target http://testphp.vulnweb.com/listproducts.php?cat=1 🏁 Method GET 🖥 Worker 100 🔦 BAV true ⛏ Mining true (Gf-Patterns) 🔬 Mining-DOM true (mining from DOM) 🛰 Blind XSS Callback /home/kali/scripts/cookies.js ⏱ Timeout 10 📤 FollowRedirect false 🕰 Started at 2023-03-22 00:54:14.754845369 +0000 UTC m=+0.011778748