This extension sends responses to a locally-running
XSS-Detector server, powered by either Phantom.js and/or Slimer.js
Usage:
Before starting an attack it is necessary to start the XSS-Detector servers.
Navigate to the xss-detector directory and execute the following:
$ phantomjs xss.js &
$ slimerjs slimer.js &
The server will listen by default on port 8093. The server is expecting base64 encoded page responses passed via the http-response, which will be passed via the Burp extender.
Navigate to the xssValidator tab, and copy the value for Grep Phrase. Enter this value within the Burp Intruder grep-match function. Payloads that match this Grep Phrase indicate successful execution of XSS payload.
Examples:
Within the xss-detector directory there is a folder of examples which can be used to test the extenders functionality.
Requires Java version 7