This extension sends responses to a locally-running XSS-Detector server, powered by either Phantom.js and/or Slimer.js

Usage:

Before starting an attack it is necessary to start the XSS-Detector servers. Navigate to the xss-detector directory and execute the following:

$ phantomjs xss.js &
$ slimerjs slimer.js &

The server will listen by default on port 8093. The server is expecting base64 encoded page responses passed via the http-response, which will be passed via the Burp extender.

Navigate to the xssValidator tab, and copy the value for Grep Phrase. Enter this value within the Burp Intruder grep-match function. Payloads that match this Grep Phrase indicate successful execution of XSS payload.

Examples:

Within the xss-detector directory there is a folder of examples which can be used to test the extenders functionality.

Requires Java version 7