From dd176c1582d6cde2ccb524e687362d7df8e68a3d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=ED=95=98=ED=9B=8C?= Date: Tue, 24 Dec 2019 01:34:09 +0900 Subject: [PATCH] Update README.md --- README.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index bb8042c..6d031a8 100644 --- a/README.md +++ b/README.md @@ -65,6 +65,7 @@ $ xspear -u 'https://www.hahwul.com/?q=123' --cookie='role=admin' [ Options ] -u, --url=target_URL [required] Target Url -d, --data=POST Body [optional] POST Method Body data + -a, --test-all-params [optional] test to all params(include not reflected) --headers=HEADERS [optional] Add HTTP Headers --cookie=COOKIE [optional] Add Cookie --raw=FILENAME [optional] Load raw file(e.g raw_sample.txt) @@ -81,7 +82,7 @@ $ xspear -u 'https://www.hahwul.com/?q=123' --cookie='role=admin' + v=3 : show detail log(req/res) -h, --help Prints this help --version Show XSpear version - --update Show how to update + --update Show how to update - ``` ### Result types @@ -117,10 +118,10 @@ $ xspear -u "http://testphp.vulnweb.com/search.php?test=query" -t 30 $ xspear -u "http://testphp.vulnweb.com/search.php?test=query&cat=123&ppl=1fhhahwul" -p cat,test ``` -**testing blind xss**
+**testing blind xss(all params)**
(Should be used as much as possible because Blind XSS is everywhere)
``` -$ xspear -u "http://testphp.vulnweb.com/search.php?test=query" -b "https://hahwul.xss.ht" +$ xspear -u "http://testphp.vulnweb.com/search.php?test=query" -b "https://hahwul.xss.ht" -a # Set your blind xss host. <-b options> ```