Usage of Kxss Tool in Kali Linux

In this section, we will see the practical usage of the Kxss tool on testing websites.

Example 1: Target – “http://testasp.vulnweb.com/Search.asp?tfSearch=ok”

Execute the below command in the terminal. This will find the unfiltered parameters on the target website and turn the results on the terminal itself.

echo "http://testasp.vulnweb.com/Search.asp?tfSearch=ok" | kxss

Testing target 1 application

Now we can pass the malicious payload in the parameter and paste the URL into the browser. In the below screenshot, you can see that we have executed the malicious payload by inserting the script in the parameter as it was unfiltered.

Payload Executed on Target 1

Example 2: Target – “http://www.xss-game.appspot.com/level1/frame?query=hello”

In this example, we will test one more target-testing web application. We are running the Kxss tool against the target application to find the unfiltered parameters, Through this we can inject the malicious code and get access to the web application.

echo "http://www.xss-game.appspot.com/level1/frame?query=hello" | kxss

Testing target 2 application

As we have got the unfiltered parameters list, we have created a script and pasted it in the URL. When we hit the website, the script got executed and the XSS payload got triggered.

Payload Executed on Target 2

Kxss – Tool to to Identify XSS Vulnerable Parameters / Patterns

Cross-site scripting is a common vulnerability and bug, which is the trending vulnerability identified in most web-based applications. The attacker injects some malicious popup javascript code in input parameters or sometimes through file uploads. So periodically, website designers or developers validate the input fields by encoding and validating the provided input by the user. So Kxss tool comes into focus for this identification. Kxss tool is a Golang language-based tool that finds the vulnerable parameters and patterns in the target domain URL. So if you get a positive result, you can make your XSS payload or use a strong XSS payload wordlist to hit and try XSS vulnerability on the target domain.

Similar Reads

Installation of Kxss Tool in Kali Linux

For installing the Kxss tool in Kali Linux, we have 2 different methods. Below we have added the list of these installation methods:...

Method 2: Installing Using wget

In this method, we are using the wget command to get the package of the KXss tool in Kali Linux. Follow the below steps to install the tool in Kali Linux using the wget command....

Usage of Kxss Tool in Kali Linux

In this section, we will see the practical usage of the Kxss tool on testing websites....

Conclusion

In conclusion, testing the web application is an important process to prevent the software and application bugs at the early stage of the deployment. Using the automated testing tools to find the security bugs can be helpful to make the application more potentially strong against hackers. As XSS is one of the powerful attack that can impact the data of the application, to prevent this bug we can use Kxss tool and perform the XSS Testing on the web application for minimizing the rrisk of data or security theft....

Contact Us