<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to XSSploit-en</title><link>https://sourceforge.net/p/maguey/wiki/XSSploit-en/</link><description>Recent changes to XSSploit-en</description><atom:link href="https://sourceforge.net/p/maguey/wiki/XSSploit-en/feed" rel="self"/><language>en</language><lastBuildDate>Fri, 08 Nov 2019 17:38:11 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/maguey/wiki/XSSploit-en/feed" rel="self" type="application/rss+xml"/><item><title>XSSploit-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/XSSploit-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v5
+++ v6
@@ -1,5 +1,5 @@
 
-[[img src=https://sourceforge.net/p/maguey/wiki/repo_img/attachment/MAGUEY-2-Logo.png height=25% width=25% style=float:right]]
+[[img src=https://sourceforge.net/p/maguey/wiki/Home/attachment/LogoMaguey.png height=25% width=25% style=float:right]]
 &lt;br/&gt;&lt;br/&gt;

 &lt;div id="link" style="text-align: right;"&gt;&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/Toolset-en/" style="color: #4CAB68; text-decoration: underline;"&gt;Back&lt;/a&gt;  &lt;a href="https://sourceforge.net/p/maguey/wiki/XSSploit-es" style="color: #4CAB68; text-decoration: underline;"&gt;Español&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;
@@ -52,7 +52,7 @@

 &lt;p&gt;
 &lt;b&gt;Reports:&lt;/b&gt;&lt;br/&gt;
-Output reports:  Yes  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;✔&lt;/span&gt;
+Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;✔&lt;/span&gt;
 &lt;br/&gt;
 Customizable reports in XML format with the following options:
 &lt;/p&gt;&lt;ul&gt;
@@ -65,7 +65,7 @@
 

 &lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
-&lt;b&gt;Scan for Cross-Site Scripting vulnerabilities. &lt;/b&gt;The following command shows the basic syntax to scan a Web Application for a Cross-Site Scripting vulnerability search.
+&lt;b&gt;Perform a vulnerability scan on a web application. &lt;/b&gt;Start the tool and on the GUI will be available three tabs: “Scan”, “XSS Exploit” and “Report”.

 On the “Scan” tab provide the web application URL address and press the “Spider” button. The tool will generate a list on the right panel of detected URLs, Forms and parameters from the web application.

&lt;/ul&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Fri, 08 Nov 2019 17:38:11 -0000</pubDate><guid>https://sourceforge.netaffc261f138205df3ed3e3ab06e66bebfc66f276</guid></item><item><title>en-XSSploit modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/en-XSSploit/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v4
+++ v5
@@ -1,5 +1,5 @@
 
-[[img src=https://sourceforge.net/p/maguey/wiki/Home/attachment/LogoMaguey.png height=25% width=25% style=float:right]]
+[[img src=https://sourceforge.net/p/maguey/wiki/repo_img/attachment/MAGUEY-2-Logo.png height=25% width=25% style=float:right]]
 &lt;br/&gt;&lt;br/&gt;

 &lt;div id="link" style="text-align: right;"&gt;&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/Toolset-en/" style="color: #4CAB68; text-decoration: underline;"&gt;Back&lt;/a&gt;  &lt;a href="https://sourceforge.net/p/maguey/wiki/XSSploit-es" style="color: #4CAB68; text-decoration: underline;"&gt;Español&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;
@@ -52,7 +52,7 @@

 &lt;p&gt;
 &lt;b&gt;Reports:&lt;/b&gt;&lt;br/&gt;
-Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;✔&lt;/span&gt;
+Output reports:  Yes  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;✔&lt;/span&gt;
 &lt;br/&gt;
 Customizable reports in XML format with the following options:
 &lt;/p&gt;&lt;ul&gt;
@@ -65,7 +65,7 @@
 

 &lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
-&lt;b&gt;Perform a vulnerability scan on a web application. &lt;/b&gt;Start the tool and on the GUI will be available three tabs: “Scan”, “XSS Exploit” and “Report”.
+&lt;b&gt;Scan for Cross-Site Scripting vulnerabilities. &lt;/b&gt;The following command shows the basic syntax to scan a Web Application for a Cross-Site Scripting vulnerability search.

 On the “Scan” tab provide the web application URL address and press the “Spider” button. The tool will generate a list on the right panel of detected URLs, Forms and parameters from the web application.

&lt;/ul&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Fri, 08 Nov 2019 16:58:10 -0000</pubDate><guid>https://sourceforge.net6b6f3c673876be7ff8e25441f69e9eb6c4937c12</guid></item><item><title>XSSploit-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/XSSploit-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v3
+++ v4
@@ -7,7 +7,7 @@
 &lt;h1 style="color: #4CAB68;"&gt;XSSploit&lt;/h1&gt;
 &lt;!-- **********************  PHASES ********************** --&gt;

-&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;1769242397
+&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;
 Primary: Discovery.
 Secondary:  N/A.

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 19:25:12 -0000</pubDate><guid>https://sourceforge.net8cd4e4f5b171a28e999b75933f2773f0bc0b3acc</guid></item><item><title>XSSploit-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/XSSploit-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v2
+++ v3
@@ -65,91 +65,19 @@
 &lt;!-- **********************  USAGE ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
-&lt;b&gt;Perform a vulnerability scan on a web application. &lt;/b&gt;The following instruction initiates the scan on a web application.
+&lt;b&gt;Perform a vulnerability scan on a web application. &lt;/b&gt;Start the tool and on the GUI will be available three tabs: “Scan”, “XSS Exploit” and “Report”.

-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-./skipfish –A usuario:password –o [Directorio] –K jsession –I http://localhost/ -X /miaplicacion/logout.php http://localhost/miaplicacion
-&lt;/div&gt;&lt;br /&gt;
+On the “Scan” tab provide the web application URL address and press the “Spider” button. The tool will generate a list on the right panel of detected URLs, Forms and parameters from the web application.

-&lt;p&gt;
-Where:
-&lt;ul&gt;
-&lt;li&gt;-A: Web application username &amp; password. 
-&lt;/li&gt;&lt;li&gt;-o: Report export path. 
-&lt;/li&gt;&lt;li&gt;-K: Excluded parameters from the scan.
-&lt;/li&gt;&lt;li&gt;-I: Included URLs from the scan.
-&lt;/li&gt;&lt;li&gt;-X: Excluded URLs from the scan.
-&lt;/li&gt;&lt;/ul&gt;
-&lt;/p&gt;
+Press the “Analyze” button under the displayed results to begin the Cross Site Scripting scan analysis. Once the analysis is completed, the number of vulnerabilities, both detected and exploitable is displayed on the progress bar.

-The tool will display informative details directed at the user such as an early scan termination in case it’s required as well as recommendation.
+The analysis results will be present on the “XSS” tab.

-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-Welcome to skipfish. Here are some useful tips:&lt;br /&gt;
-&lt;br /&gt;
-1) To abort the scan at any time, press Ctrl-C. A partial report will be written to the specified location. To view a list of currently scanned URLs, you can press space at any time during the scan.&lt;br /&gt;
-&lt;br /&gt;
-2) Watch the number requests per second shown on the main screen. If this figure drops below 100-200, the scan will likely take a very long time.&lt;br /&gt;
-&lt;br /&gt;
-3) The scanner does not auto-limit the scope of the scan; on complex sites, you may need to specify locations to exclude, or limit brute-force steps.&lt;br /&gt;
-&lt;br /&gt;
-4) There are several new releases of the scanner every month. If you run into trouble, check for a newer version first, let the author know next.&lt;br /&gt;
-&lt;br /&gt;
-More info: http://code.google.com/p/skipfish/wiki/KnownIssues&lt;br /&gt;
-&lt;br /&gt;
-Press any key to continue (or wait 60 seconds)...&lt;br /&gt;  
+The “Exploit” tab presents the available payload options to be used for the exploitation of the Cross Site Scripting vulnerabilities. Choose any vulnerability from the “Exploitable XSS” as well as a payload type.

-&lt;/div&gt;&lt;br /&gt;
+By pressing the “Generate exploit code”, the tool will generate and display the required payload to exploit the vulnerability; for a POST petition it will include the payload while on a GET petition it will include the payload along the URL. 

-Whether 60 have passed or an interaction by the user is performed, the tool will begin with the scanning process.
-
-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-skipfish version 2.07b by &lt;br /&gt;
-&lt;br /&gt;
-  - 127.0.0.1 -&lt;br /&gt;
-&lt;br /&gt;
-Scan statistics:&lt;br /&gt;
-&lt;br /&gt;
-      Scan time : 0:00:20.990&lt;br /&gt;
-  HTTP requests : 8281 (394.5/s), 17763 kB in, 1932 kB out (938.3 kB/s)  &lt;br /&gt;
-    Compression : 0 kB in, 0 kB out (0.0% gain)    &lt;br /&gt;
-    HTTP faults : 0 net errors, 0 proto errors, 0 retried, 0 drops&lt;br /&gt;
- TCP handshakes : 187 total (44.3 req/conn)  &lt;br /&gt;
-     TCP faults : 0 failures, 0 timeouts, 14 purged&lt;br /&gt;
- External links : 7 skipped&lt;br /&gt;
-   Reqs pending : 0          &lt;br /&gt;
-&lt;br /&gt;
-Database statistics:&lt;br /&gt;
-&lt;br /&gt;
-         Pivots : 140 total, 140 done (100.00%)   &lt;br /&gt; 
-    In progress : 0 pending, 0 init, 0 attacks, 0 dict   &lt;br /&gt;  
-  Missing nodes : 121 spotted&lt;br /&gt;
-     Node types : 1 serv, 123 dir, 2 file, 4 pinfo, 0 unkn, 10 par, 0 val&lt;br /&gt;
-   Issues found : 153 info, 0 warn, 3 low, 10 medium, 2 high impact&lt;br /&gt;
-      Dict size : 123 words (123 new), 2 extensions, 143 candidates&lt;br /&gt;
-
-&lt;/div&gt;&lt;br /&gt;
-
-When the scan is completed the tool will begin exporting the results on the specified path.
-
-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-[+] Copying static resources...&lt;br /&gt;
-[+] Sorting and annotating crawl nodes: 140&lt;br /&gt;
-[+] Looking for duplicate entries: 140&lt;br /&gt;
-[+] Counting unique nodes: 15&lt;br /&gt;
-[+] Saving pivot data for third-party tools...&lt;br /&gt;
-[+] Writing scan description...&lt;br /&gt;
-[+] Writing crawl tree: 140&lt;br /&gt;
-[+] Generating summary views...&lt;br /&gt;
-[+] Report saved to 'reports_clean/test003/index.html' [0x6e72d1d6].&lt;br /&gt;
-[+] This was a great day for science!&lt;br /&gt;
-&lt;/div&gt;&lt;br /&gt;
-
-&lt;b&gt;Example report:&lt;/b&gt;
-
-&lt;a href="https://sourceforge.net/p/maguey/wiki/repo_img/attachment/Skipfish-01.jpg"&gt;
-[[img src=https://sourceforge.net/p/maguey/wiki/repo_img/attachment/Skipfish-01.jpg alt=image height=50% width=50%]]
-&lt;/a&gt;
+Finally on the “Report” tab select the required export format and press the “Save” button.

 &lt;!-- **********************  RESOURCES ********************** --&gt;

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 19:24:52 -0000</pubDate><guid>https://sourceforge.net21333da0a443bde6b5a4250404ec9b2a2ab65209</guid></item><item><title>XSSploit-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/XSSploit-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -14,29 +14,39 @@
 &lt;!-- **********************  DESCRIPTION ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
-Tool that performs a vulnerability scan on web applications. It runs in two modes, the first one performs a spidering  of the web application and the second one uses dictionary based brute force attacks.
+Tool specialized in detecting Cross Site Scripting vulnerabilities. Additionally, it generates the required payload to exploit the detected vulnerabilities.

 &lt;!-- **********************  OBJECTIVES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
 &lt;ul&gt;
-&lt;li&gt;Detect vulnerabilities on the web application.
+&lt;/li&gt;&lt;li&gt;Detect Cross Site Scripting vulnerabilities and prepare them for their exploitation.
 &lt;/li&gt;&lt;/ul&gt;

 &lt;!-- **********************  FEATURES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
-&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP).
+&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP/HTTPS).

 &lt;b&gt;Operative mode:&lt;/b&gt; Active.

 &lt;p&gt;
-Detect vulnerabilities on the web application.
+Detect Cross Site Scripting vulnerabilities and prepare them for their exploitation.
 &lt;ul&gt;
-&lt;li&gt;Performs a predefined and configurable spidering on the web application; configurations include domain on the scope, restricted URLs and parameters, etc.
-&lt;/li&gt;&lt;li&gt;dentify common vulnerabilities such as Cross Site Script, SQL Injection, Path Traversal, Information Disclosure, etc.
-&lt;/li&gt;&lt;li&gt;Provides a configurable dictionary base brute force attack functionality in order to detect commons resources such as administrative, default and test pages, files backups (.old), etc.
-&lt;/li&gt;&lt;li&gt;Has the capability to include self-defined dictionaries to be used on the brute force module.
+&lt;/li&gt;&lt;li&gt;Provides a URL and Form list of the web application through a spidering module.
+&lt;/li&gt;&lt;li&gt;Fixed analysis on the Forms “text” inputs detected from the spidering searching for Cross Site Scripting vulnerabilities.
+&lt;/li&gt;&lt;li&gt;Provides a list of detected vulnerabilities based on the analysis which include the following information:
+&lt;ul&gt;
+&lt;li&gt;Whether the vulnerability can be exploited or not.
+&lt;/li&gt;&lt;li&gt;URL.
+&lt;/li&gt;&lt;li&gt;Cross Site Scripting type: Stored or Reflected.
+&lt;/li&gt;&lt;li&gt;HTTP method used (GET/POST).
+&lt;/li&gt;&lt;li&gt;Parameter name.
+&lt;/li&gt;&lt;li&gt;Context.
+&lt;/li&gt;&lt;/ul&gt;
+&lt;/li&gt;&lt;li&gt;Provides several payloads to perform the exploitation of the vulnerability.
+&lt;/li&gt;&lt;li&gt;Basic authentication support.
+&lt;/li&gt;&lt;li&gt;Customizable spidering module that allows the definition of new regular expressions through a configuration file.
 &lt;/li&gt;&lt;/ul&gt;
 &lt;/p&gt;

@@ -44,11 +54,11 @@
 &lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
 Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
 &lt;br /&gt;
-Reports in HTML format which includes the visited URLS and detected vulnerabilities divided into three sections:
+Customizable reports in XML format with the following options:
 &lt;ul&gt;
-&lt;li&gt;URL: URLs detected by the spidering module.
-&lt;/li&gt;&lt;li&gt;Document type: URL categorization by content based on the response.
-&lt;/li&gt;&lt;li&gt;Detected vulnerabilities: URL groups by matching vulnerabilities.
+&lt;/li&gt;&lt;li&gt;Detected pages by the spidering module.
+&lt;/li&gt;&lt;li&gt;Detected Forms and parameters.
+&lt;/li&gt;&lt;li&gt;Cross Site Scripting vulnerabilities detected and exploited.
 &lt;/li&gt;&lt;/ul&gt;
 

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 19:23:45 -0000</pubDate><guid>https://sourceforge.net8b9c8269b327076073cb8cced3db598d7983605f</guid></item><item><title>XSSploit-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/XSSploit-en/</link><description>&lt;div class="markdown_content"&gt;&lt;!-- ###################################### ENGLISH VERSION ###################################### --&gt;
&lt;p&gt;&lt;img height="25%" src="https://sourceforge.net/p/maguey/wiki/Home/attachment/LogoMaguey.png" style="float: right;" width="25%" /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;div id="link" style="text-align: right;"&gt;&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/Toolset-en/" style="color: #4CAB68; text-decoration: underline;"&gt;Back&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://sourceforge.net/p/maguey/wiki/XSSploit-es" style="color: #4CAB68; text-decoration: underline;"&gt;Español&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;
&lt;h1 style="color: #4CAB68;"&gt;XSSploit&lt;/h1&gt;
&lt;!-- **********************  PHASES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;
&lt;p&gt;1769242397&lt;br /&gt;
Primary: Discovery.&lt;br /&gt;
Secondary:  N/A.&lt;/p&gt;
&lt;!-- **********************  DESCRIPTION ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
&lt;p&gt;Tool that performs a vulnerability scan on web applications. It runs in two modes, the first one performs a spidering  of the web application and the second one uses dictionary based brute force attacks.&lt;/p&gt;
&lt;!-- **********************  OBJECTIVES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Detect vulnerabilities on the web application.
&lt;/li&gt;&lt;/ul&gt;
&lt;!-- **********************  FEATURES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Operative mode:&lt;/b&gt; Active.&lt;/p&gt;
&lt;p&gt;
Detect vulnerabilities on the web application.
&lt;ul&gt;
&lt;li&gt;Performs a predefined and configurable spidering on the web application; configurations include domain on the scope, restricted URLs and parameters, etc.
&lt;/li&gt;&lt;li&gt;dentify common vulnerabilities such as Cross Site Script, SQL Injection, Path Traversal, Information Disclosure, etc.
&lt;/li&gt;&lt;li&gt;Provides a configurable dictionary base brute force attack functionality in order to detect commons resources such as administrative, default and test pages, files backups (.old), etc.
&lt;/li&gt;&lt;li&gt;Has the capability to include self-defined dictionaries to be used on the brute force module.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
&lt;br /&gt;
Reports in HTML format which includes the visited URLS and detected vulnerabilities divided into three sections:
&lt;ul&gt;
&lt;li&gt;URL: URLs detected by the spidering module.
&lt;/li&gt;&lt;li&gt;Document type: URL categorization by content based on the response.
&lt;/li&gt;&lt;li&gt;Detected vulnerabilities: URL groups by matching vulnerabilities.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;!-- **********************  USAGE ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Perform a vulnerability scan on a web application. &lt;/b&gt;The following instruction initiates the scan on a web application.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
./skipfish –A usuario:password –o [Directorio] –K jsession –I http://localhost/ -X /miaplicacion/logout.php http://localhost/miaplicacion
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;
Where:
&lt;ul&gt;
&lt;li&gt;-A: Web application username &amp; password. 
&lt;/li&gt;&lt;li&gt;-o: Report export path. 
&lt;/li&gt;&lt;li&gt;-K: Excluded parameters from the scan.
&lt;/li&gt;&lt;li&gt;-I: Included URLs from the scan.
&lt;/li&gt;&lt;li&gt;-X: Excluded URLs from the scan.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;The tool will display informative details directed at the user such as an early scan termination in case it’s required as well as recommendation.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
Welcome to skipfish. Here are some useful tips:&lt;br /&gt;
&lt;br /&gt;
1) To abort the scan at any time, press Ctrl-C. A partial report will be written to the specified location. To view a list of currently scanned URLs, you can press space at any time during the scan.&lt;br /&gt;
&lt;br /&gt;
2) Watch the number requests per second shown on the main screen. If this figure drops below 100-200, the scan will likely take a very long time.&lt;br /&gt;
&lt;br /&gt;
3) The scanner does not auto-limit the scope of the scan; on complex sites, you may need to specify locations to exclude, or limit brute-force steps.&lt;br /&gt;
&lt;br /&gt;
4) There are several new releases of the scanner every month. If you run into trouble, check for a newer version first, let the author know next.&lt;br /&gt;
&lt;br /&gt;
More info: http://code.google.com/p/skipfish/wiki/KnownIssues&lt;br /&gt;
&lt;br /&gt;
Press any key to continue (or wait 60 seconds)...&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Whether 60 have passed or an interaction by the user is performed, the tool will begin with the scanning process.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
skipfish version 2.07b by &lt;br /&gt;
&lt;br /&gt;
  - 127.0.0.1 -&lt;br /&gt;
&lt;br /&gt;
Scan statistics:&lt;br /&gt;
&lt;br /&gt;
      Scan time : 0:00:20.990&lt;br /&gt;
  HTTP requests : 8281 (394.5/s), 17763 kB in, 1932 kB out (938.3 kB/s)  &lt;br /&gt;
    Compression : 0 kB in, 0 kB out (0.0% gain)    &lt;br /&gt;
    HTTP faults : 0 net errors, 0 proto errors, 0 retried, 0 drops&lt;br /&gt;
 TCP handshakes : 187 total (44.3 req/conn)  &lt;br /&gt;
     TCP faults : 0 failures, 0 timeouts, 14 purged&lt;br /&gt;
 External links : 7 skipped&lt;br /&gt;
   Reqs pending : 0          &lt;br /&gt;
&lt;br /&gt;
Database statistics:&lt;br /&gt;
&lt;br /&gt;
         Pivots : 140 total, 140 done (100.00%)   &lt;br /&gt; 
    In progress : 0 pending, 0 init, 0 attacks, 0 dict   &lt;br /&gt;  
  Missing nodes : 121 spotted&lt;br /&gt;
     Node types : 1 serv, 123 dir, 2 file, 4 pinfo, 0 unkn, 10 par, 0 val&lt;br /&gt;
   Issues found : 153 info, 0 warn, 3 low, 10 medium, 2 high impact&lt;br /&gt;
      Dict size : 123 words (123 new), 2 extensions, 143 candidates&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;When the scan is completed the tool will begin exporting the results on the specified path.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
[+] Copying static resources...&lt;br /&gt;
[+] Sorting and annotating crawl nodes: 140&lt;br /&gt;
[+] Looking for duplicate entries: 140&lt;br /&gt;
[+] Counting unique nodes: 15&lt;br /&gt;
[+] Saving pivot data for third-party tools...&lt;br /&gt;
[+] Writing scan description...&lt;br /&gt;
[+] Writing crawl tree: 140&lt;br /&gt;
[+] Generating summary views...&lt;br /&gt;
[+] Report saved to 'reports_clean/test003/index.html' [0x6e72d1d6].&lt;br /&gt;
[+] This was a great day for science!&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Example report:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/repo_img/attachment/Skipfish-01.jpg"&gt;&lt;br /&gt;
&lt;img alt="image" height="50%" src="https://sourceforge.net/p/maguey/wiki/repo_img/attachment/Skipfish-01.jpg" width="50%" /&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;!-- **********************  RESOURCES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Resources:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Link:&lt;/b&gt; &lt;a href="http://www.scrt.ch/en/attack/downloads/xssploit" rel="nofollow"&gt;http://www.scrt.ch/en/attack/downloads/xssploit&lt;/a&gt; &lt;br /&gt;
&lt;b&gt;Author(s):&lt;/b&gt; SCRT Information Security&lt;br /&gt;
&lt;b&gt;Contact:&lt;/b&gt; info [at] scrt.ch&lt;br /&gt;
&lt;b&gt;License:&lt;/b&gt; GNU GENERAL PUBLIC LICENSE, Versión 2&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 17:36:58 -0000</pubDate><guid>https://sourceforge.neta90c100173922fdf765c895c8c90461728e76a2c</guid></item></channel></rss>