A Selenium boilerplate for automating web exploits. Use responsibly and ethically.
Project description
Selenium-Oxide
A Selenium boilerplate for automating web exploits. Use responsibly and ethically.
Selenium Oxide is a web exploitation automation framework designed around the needs of penetration testers and attack/defense CTF players alike! Whether you need to quickly make an automated exploit for web apps, a stealthy automation tool for attack/defense, or a springboard for other exploit development, this is the tool for you!
The module offers a slimmer API than standard Selenium, and has multiple handy features, such as:
- Stealth functionality
- Builder pattern exploit writing
- Automatic browser binary configuration
- Cookie dumping and manipulation
- Proxy support
- Chrome support
- Arbitrary selector support
- Alert waiting
- User generation
- API interface
- JavaScript execution
Why the Name?
When making this module I initially struggled with what to call it. I happened to look at another module, named Selenium Wire, and decided yeah, you know what, using Selenium in the name is fair game. Selenium Oxide sounded cool, and when I looked up information on the chemical it read that it was at least somewhat dangerous.
A dangerous version of Selenium. Checks out for an offsec platform.
Getting Started
Like regular Selenium, you're going to need a browser binary and geckodriver.
Selenium Oxide supports both Firefox and Chrome.
Firefox
First, you'll want to grab a binary of Firefox. I recommend the following flow for installing on UNIX systems. Once you've downloaded a version of firefox you like (for that, the official download page is usually sufficient):
tar -xjf your_firefox_archive.tar.bz2
sudo mv firefox /opt
This way, your Firefox binary will be in /opt/firefox/firefox
, which is the
default location the module looks at. Perfect.
If you already have a Firefox binary on hand (maybe you already used Selenium), then you can just specify the location in the exploit builder constructor.
Then, you'll need Geckodriver. You can grab that from here.
tar -xzf your_geckodriver_archive.tar.gz
sudo mv geckodriver /usr/bin
So long as Geckodriver is in your path, you should be golden.
Chrome
Installing Chrome for Seleniumis usually even easier than installing Firefox. Install Chrome normally through your preferred package manager, then grab a copy of Chromedriver. Extract it and move it into /opt like so:
sudo mv chromedriver /opt
Also for reference, you can find your Chrome binary with the which
command:
which google-chrome
Final Steps
Next, just install from Pip!
python3 -m pip install selenium-oxide
If that doesn't work, you may have an outdated version of Selenium (this library needs 4.1.0 or greater). If so:
pip install --upgrade selenium
That should install everythng you need.
Using Selenium Oxide
Selenium Oxide is a builder-pattern exploit automation framework, designed to provide a more immediately usable method of exploit automation before resorting to using the network tab. The ability to use proxies makes the tool extremely useful as a ground layer for API-focused exploit development as well.
The Basics
First, import the module:
from selenium_oxide.exploit_builder import ExploitBuilder
The ExploitBuilder constructor takes a number of arguments, two being mandatory:
exploit = ExploitBuilder(
#protocol
"https",
#hostname
"juice-shop.herokuapp.com",
#options (explained in docs)
**options
)
protocol
and hostname
correspond to the protocol (HTTP, HTTPS)
and hostname (domain, IP/port, etc) used by the web app.
Stealth mode is interesting, allowing the user to avoid alerting blue teams with multiple rapid requests. As of 1.0.0, it uses the length of user inputs to determine how long its sleep time is before writing text in input boxes. There is some randomness thrown in as well, to really throw off blue teams. However, this may be painfully slow while you're waiting on the input to appear, so do keep an eye on your terminal for crashes. Adjustable stealth timings may appear in a future release.
Proxy support is a 1.0.0 addition, allowing the user to use proxies (such as ZAP or Burp Suite) to track their HTTP requests and responses. This is handy for mapping out APIs and finding potential additional vulnerabilities.
To start building exploits, you can chain functions together!
(
exploit.get("/")
.login("/#/login", "admin' OR 1=1;--", "password", '//*[@id="email"]', '//*[@id="password"]', '//*[@id="loginButton"]')
.type_entry('//*[@id="mat-input-0"]', "<img src=\"http://url.to.file.which/not.exist\" onerror=alert(document.cookie);>")
.send_enter('//*[@id="mat-input-0"]')
)
However, some functions, like get_cookies
or get_cookie_by_name
cannot be chained into
other functions, and further exploitation must begin on a new line.
Further Reading
The API documentation on ReadtheDocs will have more information on how to use the framework to its full potential.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file selenium-oxide-1.2.1.tar.gz
.
File metadata
- Download URL: selenium-oxide-1.2.1.tar.gz
- Upload date:
- Size: 11.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.10.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 4bd9455fa8283645ec76ba852dcf541bf30ddc9a186466c3ef4afe1d1cd74920 |
|
MD5 | f80fde58c0022a5fbce2be3b97e5f7b1 |
|
BLAKE2b-256 | fbf789a9f5d041c5f434f4d3e4c4c0f4d74326db6960532073b0fde1ead8fddd |
File details
Details for the file selenium_oxide-1.2.1-py3-none-any.whl
.
File metadata
- Download URL: selenium_oxide-1.2.1-py3-none-any.whl
- Upload date:
- Size: 8.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.10.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | c8f2d797d7b651d9b4023ccc073bcf3e93f796dc552aae480bff6d4d7e5c3019 |
|
MD5 | 18804f5ded8f040c9081f3d60f020ed6 |
|
BLAKE2b-256 | 1a937748ff3b07acc34a3b3f5408b8344838ffd811a61fb167441d1cc2ed17c8 |