a dictionary-based XSS mutation fuzzer
Project description
About
Meissner Lop is a dictionary-based mutation-based exploit fuzzer for XSS.
Installation
Automatic
pip3 install meissner
Manual
git clone https://github.com/arinerron/meissner.git
cd meissner
sudo ./setup.py install
Usage
usage: meissner [-h] [--no-ansi] [--log-level LOG_LEVEL] [--url URL] [--dictionary DICTIONARY] [--threads THREADS] [--filter FILTER] [--engine ENGINE] [cmd [cmd ...]]
Meissner Lop - XSS Filter Bypass Exploit Fuzzer
positional arguments:
cmd the command to execute, where {xss} is the injection point
optional arguments:
-h, --help show this help message and exit
--no-ansi, -c disable ANSI coloring on all output
--log-level LOG_LEVEL, -v LOG_LEVEL
set logging level
--url URL, --uri URL, -u URL
use a URL harness, where {xss} is the injection point
--dictionary DICTIONARY, --dict DICTIONARY, -d DICTIONARY
the Meissner mutation dictionary to use
--threads THREADS, --threads-count THREADS, -t THREADS
the number of threads allocated to use for engines
--filter FILTER, -f FILTER
pass the input through a filter before the program
--engine ENGINE, --browser ENGINE, -e ENGINE
the browser rendering engine to use
General
When entering a URL, simply put the string {xss}
where you would like to insert XSS payloads. For example:
meissner --url 'https://example.com/vulnerable.php?query={xss}'
Additionally, if you have a script that outputs the generated HTML, Meissner Lop can work with you. For example, if a mutation XSS CTF challenge provides source and you setup a local instance at https://localhost:8080/xss.php
, you may use that as the URL. It is more efficient to run instances locally as HTTP requests will not have to travel across the internet.
Meissner can also provide XSS payloads through argv
if you have an executable that generates HTML output. This option is by far the most efficient as it removes need for HTTP servers/clients and networking.
For example, if your executable is called ./give-me-flag
, you may use the tool like:
meissner -- ./give-me-flag '{xss}'
If the {xss}
argument is not found in the arguments, Meissner will assume that you would like payloads to be passed through stdin/stdout.
Limitations
- The tool does not attempt to abide by any character or length restrictions. This does not mean that it will not work for your specific XSS vulnerability, however; just that it may take longer to find something as the tool is not specifically trying to abide by restrictions.
- Meissner does not attempt to parse HTML and bypass filters in that way; rather, it is a "dumb" fuzzer and prioritizes based on cases it considers interesting. However, it can brute-force XSS challenges MUCH faster than you can. I'd recommend running this tool in the background while you manually solve challenges.
- The fuzzer may take the fun of the challenge away from you. If you are playing a CTF for fun, then solve the challenge by hand! ... unless you get some sort of odd satisfaction from using tools to solve all your problems like I do--in which case, by all means, use this tool.
TODO
-
double URL encoding
-
New features
- more intelligent fuzzing
- detect "interesting" cases and prioritize them
- more mutations
- randomly pick bytes to encode with HTML entities
- make HTTP requests more flexible
- random user agent generation
POST
,PUT
, etc requests- cookies
- proxies
- requests from a file
- support custom filters through Python files (use stdin/stdout)
- if
{xss}
not found in stdin/stdout, write through stdin - saving and restoring progress
- more intelligent fuzzing
-
Fix bugs / race conditions (search for
XXX:
in the code!)- expose some of the hardcoded timeouts to the CLI
-
Write documentation
-
Create more / better dictionaries
-
Optimizations!
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file meissner-1.0.2.tar.gz
.
File metadata
- Download URL: meissner-1.0.2.tar.gz
- Upload date:
- Size: 15.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/46.1.3 requests-toolbelt/0.9.1 tqdm/4.43.0 CPython/3.8.2
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1f614db7d5a6d4ef8fd73397bef703d17b79c53ab14b46aa31bbd4a931995944 |
|
MD5 | b8c04dea6c59af649e9d6a236caf47f9 |
|
BLAKE2b-256 | da6e1d5e6150f1b2ab41b6715b5b627afee65569848425bb8e0c219b970e3821 |
File details
Details for the file meissner-1.0.2-py3-none-any.whl
.
File metadata
- Download URL: meissner-1.0.2-py3-none-any.whl
- Upload date:
- Size: 16.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/46.1.3 requests-toolbelt/0.9.1 tqdm/4.43.0 CPython/3.8.2
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e068de5754cb3384b7e44df05bf770e2a65e7d4368c245a041048bfa8453c025 |
|
MD5 | 6667d5c9e98a03bff980ee82e0f803af |
|
BLAKE2b-256 | 9f4d74d74c75c564df0dadd0e10b80fccc6931a18ab9e06f1e3f0713fa58afb5 |