Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Toxssin - An XSS Exploitation Command-Line Interface And Payload Generator

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Toxssin - An XSS Exploitation Command-Line Interface And Payload Generator


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: kitploit.com


toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of an https server that works as an interpreter for the traffic generated by the malicious JavaScript payload that powers this tool (toxin.js).

This project started as (and still is) a research-based creative endeavor to explore the exploitability depth that an XSS vulnerability may introduce by using vanilla JavaScript, trusted certificates and cheap tricks.

Disclaimer: The project is quite fresh and has not been widely tested.

Video Presentation


Find screenshots here.

Capabilities

By default, toxssin intercepts:

  • cookies (if HttpOnly not present),
  • keystrokes,
  • paste events,
  • input change events,
  • file selections,
  • form submissions,
  • server responses,
  • table data (static as well as updates),

Most importantly, toxssin:

  • attempts to maintain XSS persistence while the user browses the website by intercepting http requests & responses and re-writing the document,
  • supports session management, meaning that, you can use it to exploit reflected as well as stored XSS,
  • supports custom JS script execution against sessions,
  • automatically logs every session.

Installation & Usage

git clone https://github.com/t3l3machus/toxssin
cd ./toxssin
pip3 install -r requirements.txt

To start toxssin.py, you will need to supply ssl certificate and private key files.

If you don't own a domain with a trusted certificate, you can issue and use self-signed certificates with the following command (although this won't take you far):

openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 365

It is strongly recommended to run toxssin with a trusted certificate (see How to get a Valid Certificate in this document). That said, you can start the toxssin server like this:

# python3 toxssin.py -u https://your.domain.com -c /your/certificate.pem -k /your/privkey.pem

Visit the project's wiki for additional information.

XSS Exploitation Obstacles

In my experience, there are 4 major obstacles when it comes to Cross-Site Scripting attacks attempting to include external JS scripts:

  1. the "Mixed Content" error, which can be resolved by serving the JavaScript payload via https (even with a self-signed certificate).
  2. the "NET::ERR_CERT_AUTHORITY_INVALID" error, which indicates that the server's certificate is untrusted / expired and can be bypassed by using a certificate issued by a trusted Authority.
  3. Cross-origin resource sharing (CORS), which is handled appropriately by the toxssin server.
  4. Content-Security-Policy header with the script-src set to specific domain(s) only will block scripts with cross-domain src from loading. Toxssin relies on the eval() function to deliver its poison, so, if the website has a CSP and the unsafe-eval source expression is not specified in the script-src directive, the attack will most likely fail (i'm working on a second poison delivery method to work around this).

Note: The "Mixed Content" error can of course occur when the target website is hosted via http and the JavaScript payload via https. This limits the scope of toxssin to https only webistes, as (by default) toxssin is started with ssl only.

How to get a Valid Certificate

First, you need to own a domain name. The fastest and most economic way to get one (in my knowledge) is via a cheap domain registrar service (e.g. https://www.namecheap.com/). Search for a random string domain name (e.g. "fvcm98duf") and check the less popular TLDs, like .xyz, as they will probably cost around 3$ per year.

After you purchase a domain name, you can use certbot (Let's Encrypt) to get a trusted certificate in 5 minutes or less:

  1. Append an A record to your Domain's DNS settings so that it points to your server ip,
  2. Follow certbots official instructions.

Tip: Don't install and run certbot on your own, you might get unexpected errors. Stick with the instructions.

Changelog

2022-06-19 - Added the exec prompt command (you can now execute custom JS scripts against a session).
2022-06-23 - I added two simple, dirty scripts as templates for testing the exec prompt command. I also fixed the cmd prompt's backward history access and made some improvements.

Future

The idea is to make it sharper, more reliable and expand its capabilities. Currently, i'm working on improving file captures.



...



๐Ÿ“Œ XSS-LOADER - XSS Payload Generator / XSS Scanner / XSS Dork Finder


๐Ÿ“ˆ 55.79 Punkte

๐Ÿ“Œ xss2png ~ PNG IDAT chunks XSS payload generator


๐Ÿ“ˆ 33.45 Punkte

๐Ÿ“Œ Aladdin - Payload Generation Technique That Allows The Deseriallization Of A .NET Payload And Execution In Memory


๐Ÿ“ˆ 31.82 Punkte

๐Ÿ“Œ Some-Tweak-To-Hide-Jwt-Payload-Values - A Handful Of Tweaks And Ideas To Safeguard The JWT Payload


๐Ÿ“ˆ 31.82 Punkte

๐Ÿ“Œ [[ PAYLOAD ]] - The Situation Response Payload - Hak5 2317


๐Ÿ“ˆ 30.03 Punkte

๐Ÿ“Œ [[ PAYLOAD ]] - Best Payload Practices - Hak5 2318


๐Ÿ“ˆ 30.03 Punkte

๐Ÿ“Œ [[ PAYLOAD ]] - OS Detection Payload - Hak5 2319


๐Ÿ“ˆ 30.03 Punkte

๐Ÿ“Œ [[ PAYLOAD ]] - Best Payload Practices - Hak5 2318 (RE-UPLOAD)


๐Ÿ“ˆ 30.03 Punkte

๐Ÿ“Œ Learn Polymorphic Powershell Payload Techniques! [PAYLOAD]


๐Ÿ“ˆ 30.03 Punkte

๐Ÿ“Œ What is Request Payload / Payload Body 2019


๐Ÿ“ˆ 30.03 Punkte

๐Ÿ“Œ PAYLOAD: ICMP Data Exfiltration - USB Rubber Ducky/Exfiltration [PAYLOAD MINUTE]


๐Ÿ“ˆ 30.03 Punkte

๐Ÿ“Œ PAYLOAD: DuckyLogger 2.0 - Keylogger for USB Rubber Ducky [PAYLOAD MINUTE]


๐Ÿ“ˆ 30.03 Punkte

๐Ÿ“Œ Getwin - FUD Win32 Payload Generator And Listener


๐Ÿ“ˆ 27.79 Punkte

๐Ÿ“Œ GetWin: An Undetectable Win32 Payload Generator and Listener


๐Ÿ“ˆ 27.79 Punkte

๐Ÿ“Œ Malicious Payload Evasion Techniques with Advanced Exploitation Frameworks


๐Ÿ“ˆ 26.93 Punkte

๐Ÿ“Œ RapidPayload Framework - Metasploit Payload Generator - Kali Linux


๐Ÿ“ˆ 26.01 Punkte

๐Ÿ“Œ Overview of a Mirai Payload Generator, (Sat, Mar 11th)


๐Ÿ“ˆ 26.01 Punkte

๐Ÿ“Œ RapidPayload - Metasploit Payload Generator


๐Ÿ“ˆ 26.01 Punkte

๐Ÿ“Œ Catchyou - FUD Win32 Msfvenom Payload Generator


๐Ÿ“ˆ 26.01 Punkte

๐Ÿ“Œ SNOWCRASH - A Polyglot Payload Generator


๐Ÿ“ˆ 26.01 Punkte

๐Ÿ“Œ Xeca - PowerShell Payload Generator


๐Ÿ“ˆ 26.01 Punkte

๐Ÿ“Œ SNOWCRASH - A Polyglot Payload Generator


๐Ÿ“ˆ 26.01 Punkte

๐Ÿ“Œ Mimicry - Security Tool For Active Deception In Exploitation And Post-Exploitation


๐Ÿ“ˆ 25.62 Punkte

๐Ÿ“Œ RouterSploit - Find Router Exploitation on Kali Linux 2018.2 (Router Exploitation Framework)


๐Ÿ“ˆ 23.84 Punkte

๐Ÿ“Œ Nebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS


๐Ÿ“ˆ 23.84 Punkte

๐Ÿ“Œ RouterSploit - Find Router Exploitation on Kali Linux (Router Exploitation Framework)


๐Ÿ“ˆ 23.84 Punkte

๐Ÿ“Œ Web-Traffic-Generator - A Quick And Dirty HTTP/S "Organic" Traffic Generator


๐Ÿ“ˆ 23.77 Punkte

๐Ÿ“Œ Mail.ru: Reflected XSS on https://go.mail.ru/search?fr=mn&q=<payload>


๐Ÿ“ˆ 22.46 Punkte

๐Ÿ“Œ What is XSS Payload without Anything?


๐Ÿ“ˆ 22.46 Punkte

๐Ÿ“Œ OpenNMS XSS Flaw Let Attackers Inject JavaScript Payload


๐Ÿ“ˆ 22.46 Punkte

๐Ÿ“Œ TSP Dork generator v16.1|HQ Dork generator - Now with custom dork types


๐Ÿ“ˆ 21.98 Punkte

๐Ÿ“Œ TSP Dork generator v16.1|HQ Dork generator - Now with custom dork types


๐Ÿ“ˆ 21.98 Punkte











matomo