Dark C0d3rs

Full Version: XSS & Param Fuzzing via Wayback + Nuclei
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Sharing a quick and effective one-liner to discover parameter-based vulnerabilities like XSS using archived URLs and fuzzing templates.

Single Subdomain One-Liner:

Code:
echo sub.target.com | waybackurls \
  | grep "=" \
  | gf xss \
  | uro \
  | httpx -silent -mc 200 -title \
  > live-params.txt && \
nuclei -l live-params.txt -t fuzzing-templates/ -severity low,medium,high -o findings.txt


Multiple Subdomains (List from subs.txt):
Code:
cat subs.txt | while read sub; do
  echo "[*] Processing $sub"
  echo $sub | waybackurls \
    | grep "=" \
    | gf xss \
    | uro \
    | httpx -silent -mc 200,302,403 -title \
    >> live-params.txt
done

nuclei -l live-params.txt -t fuzzing-templates/ -severity low,medium,high -o findings.txt

You can also use anew in place of >> to avoid duplicate URLs in live-params.txt.

Requirements:

  • You are not allowed to view links. Register or Login to view.
  • You are not allowed to view links. Register or Login to view.
  • You are not allowed to view links. Register or Login to view.
  • You are not allowed to view links. Register or Login to view.
  • You are not allowed to view links. Register or Login to view. with fuzzing-templates


Optional Speed Boost:
Code:
cat subs.txt | xargs -P 10 -I{} bash -c \
'echo {} | waybackurls | grep "=" | gf xss | uro | httpx -silent -mc 200,302,403 -title' >> live-params.txt