Namespace: xssrays

.net.xssrays

XssRays 0.5.5 ported to BeEF by Michele "antisnatchor" Orru' The XSS detection mechanisms has been rewritten from scratch: instead of using the location hash trick (that doesn't work anymore), if the vulnerability is triggered the JS code vector will contact back BeEF. Other aspects of the original code have been simplified and improved.

Source:

Methods

(static) checkBrowser(vector_array_index)

return true is the attack vector can be launched to the current browser type.

Parameters:
Name Type Description
vector_array_index array
Source:

(static) run(url, method, vector, params, urlencode)

this is the main core function with the detection mechanisms...

Parameters:
Name Type Description
url
method
vector
params
urlencode
Source:

(static) runJobs()

run the jobs (run functions added to the stack), and clean the shit (iframes) from the DOM after a timeout value

Source:

(static) startScan(xssraysScanId, hookedBrowserSession, beefUrl, crossDomain, timeout)

main function, where all starts :-)

Parameters:
Name Type Description
xssraysScanId
hookedBrowserSession
beefUrl
crossDomain
timeout
Source: