Customizing attack modules in Rapid7’s AppSpider

How AppSpider perform attacks

AppSpider Attack Modules
Attack modules directory
Module configuration file

Module configuration file (module.cfg)

Module attack configuration file (attacks.cfg) :

Customizing an attack module

XSS_Simple Module
<AttackConfig>
<Id>XSSS_Custom_01</Id>
<Description><![CDATA[Unfiltered <noscript> tag]]></Description>
<CAPEC>18</CAPEC>
<CustomParameterList>
<CustomParameter>
<Name>AttackString</Name>
<Value><![CDATA["><noscript><p title="</noscript><img src=x onerror=alert(%RANDNUM%)>">]]></Value>
</CustomParameter>
<CustomParameter>
<Name>VulnRegex</Name>
<Value><![CDATA[]]></Value>
</CustomParameter>
</CustomParameterList>
</AttackConfig>
Traffic log of the scan

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store