Adding Knoxnl (KNOXSS) to Burp

Bhuwan BhetwalBhuwan Bhetwal
2 min read
  • Open Burp > Extensions

  • Install Piper

  • Go to Piper > Context menu items

  • Click on Add Button and Enter Name as “knoxnl”

  • In the Add menu item dialog box, enter the Name as knoxnl and change the Can handle... drop down to HTTP requests only.

  • Change both the Minimum required number of selected items and Maximum allowed number of selected items values to 1

  • Click Edit Button on Command and the Command invocation editor dialog box should be displayed

  • Now on the “Add Parameter:” input field you’ll need your python3 installed binary, your knoxnl.py file and commands and arguments.

  • Here’s How you do it:

  • Enter “which python3” on terminal and you’ll get /usr/bin/python3

  • Go to knoxnl directory (https://github.com/xnl-h4ck3r/knoxnl)

  • Search for python file (knoxnl.py) and enter pwd in your terminal and you’ll get /home/intheshell/Tools/knoxnl/knoxnl something like this (may deffer according to your folder)

  • Now enter Commands such as --burp-piper -X BOTH -A your_knoxss_api_key

  • Get your api key from https://knoxss.me/

  • Remember to enter one command per line . For example see the image to understand it properly.

    • Click the OK button on the Command invocation editor dialog box.

    • Click the OK button on the Edit menu item dialog box.

  • Now It’s Ready

    Now to scan for XSS, right click on a Request and select Extensions -> Piper -> Process 1 request -> knoxnl.

    A window should open with the title Piper — knoxnl. This Piper window stays blank until the command is complete (which could be up to 180 seconds — the default value of -t/--timeout).

    So Just wait and When complete, it should show the knoxnl output in the same way as on the command line version as shown below.

    Just close the window when you have finished.

    All the references are taken from
    https://github.com/xnl-h4ck3r/knoxnl#using-in-burp-suite-proxy

    ##Note: The API key shown above is a Randomly generated Key.

0
Subscribe to my newsletter

Read articles from Bhuwan Bhetwal directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Bhuwan Bhetwal
Bhuwan Bhetwal

Hi, I’m a Penetration Tester. My job is to intentionally make applications do things they’re not supposed to—finding flaws and exploiting them to ensure they’re secure. I specialize in Web, API, Android, and iOS security.