By Brute Logic
Research & Development in Offensive Security.

 

Back to Top

State of the art in XSS Testing

CONFIDENCE BY DESIGN

KNOXSS has a high level of confidence by design. It has almost zero false positive rate (since it has to pop the alert box to prove vulnerability) and low false negative rate regarding its XSS coverage. Its extensive list of covered XSS cases also makes it the best option out there for this kind of vulnerability.
FEATURES
KNOXSS RULES_ KNOXSS RULES_

GAME CHANGER_

Test with the smartest JavaScript injections ever.

Superior Technology

KNOXSS detects and proves XSS flaws automatically with little to no effort of the user. Just feed KNOXSS with your target URL and it will pop an alert box if it's exploitable according to its dozens of XSS covered cases.

Community Acknowledgement

KNOXSS is online for 8 years already and it's responsible for several success cases with thousands of PoCs. From bug hunters to penetration testers, KNOXSS was used by more than 18k users throughout this time.

Outstanding support

KNOXSS service is able to offer fast technical support via X (former Twitter) chat sometimes in a matter of minutes. It's provided by knowledgeable people with experience and deep understanding of automated testing and Cross-Site Scripting.

GAME CHANGER_ GAME CHANGER_

FUTURE IS HERE_

Join the next revolution in offensive security tools.

FEATURING

TYPES

 

Source-based XSS

  • HTML Context
  • JavaScript Context
  • XML Context

.

DOM-based XSS

  • Document Sink
  • Location Sink
  • Execution Sink

 

Blind XSS (email report)

  • Custom Payloads
  • Automatic Injection

INJECTION

 

Input Scope

  • POST Body parameters (value and name)
  • URL Parameters (value and name)
  • URL Path (3 levels deep)
  • URL Fragment

 

Input Techniques

  • Base64 and Double Encode
  • Multi injection and Multi Context
  • Parameter Guessing

 

Input Authentication

  • User provided headers

EXCLUSIVE

 

Modes

  • XSS Polyglots
  • PoC Checking

 

ReferenceError Fix

  • JS Object Hoisting
  • JS Hoisting Override

 

Filter Bypass

  • Fully validated URL and email formats
  • Hardcoded Obfuscation
  • Evasion using I/O differences
  • Basic CSP bypass

Frequently Asked Questions

What KNOXSS does?

KNOXSS finds source-based and DOM-based reflected and stored XSS in vulnerable pages using components of URL (path and query parameters) as entry points. To see all XSS cases KNOXSS is able to spot check our XSS Coverage.

How to use KNOXSS?

The basic usage is just copy + paste the target URL in the main field of the web user interface (at knoxss.pro/ui). That's for unauthenticated GET requests, most scenarios out there. For POST requests, there's the need to provide the action URL in the main field and the POST body (pairs of name=value separated by a & sign) in the left box after clicking in the "Extra Data" button. For authenticated requests, there's a right box after clicking in "Extra Data" to provide pairs of HTTP headers (usually cookies) in the format header:value, one per line.

How KNOXSS works?

Basically, KNOXSS takes the target URL plus all extra data provided and check if there's a reflection on all URL or POST body parameter values (also on name), along with URL path (3 levels deep) and fragment. If it finds some reflection somewhere, in the HTTP response, DOM or associated JS calls, it will take some decisions on what type of injection it will use (HTML or JS injection). Finally it will try several specific XSS vectors in order to pop an alert box to prove the vulnerability.