Adding Knoxnl (KNOXSS) to Burp
Open Burp > Extensions
Install Piper
Go to Piper > Context menu items
Click on Add Button and Enter Name as “knoxnl”
In the Add menu item dialog box, enter the Name as
knoxnl
and change the Can handle... drop down toHTTP requests only
.Change both the Minimum required number of selected items and Maximum allowed number of selected items values to
1
Click Edit Button on Command and the Command invocation editor dialog box should be displayed
Now on the “Add Parameter:” input field you’ll need your python3 installed binary, your knoxnl.py file and commands and arguments.
Here’s How you do it:
Enter “which python3” on terminal and you’ll get
/usr/bin/python3
Go to knoxnl directory (https://github.com/xnl-h4ck3r/knoxnl)
Search for python file (knoxnl.py) and enter pwd in your terminal and you’ll get
/home/intheshell/Tools/knoxnl/knoxnl
something like this (may deffer according to your folder)Now enter Commands such as
--burp-piper
-X
BOTH
-A your_knoxss_api_key
Get your api key from https://knoxss.me/
Remember to enter one command per line . For example see the image to understand it properly.
Click the OK button on the Command invocation editor dialog box.
Click the OK button on the Edit menu item dialog box.
Now It’s Ready
Now to scan for XSS, right click on a Request and select Extensions -> Piper -> Process 1 request -> knoxnl.
A window should open with the title Piper — knoxnl. This Piper window stays blank until the command is complete (which could be up to 180 seconds — the default value of
-t
/--timeout
).So Just wait and When complete, it should show the knoxnl output in the same way as on the command line version as shown below.
Just close the window when you have finished.
All the references are taken from
https://github.com/xnl-h4ck3r/knoxnl#using-in-burp-suite-proxy##Note: The API key shown above is a Randomly generated Key.
Subscribe to my newsletter
Read articles from Bhuwan Bhetwal directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
Bhuwan Bhetwal
Bhuwan Bhetwal
Hi, I’m a Penetration Tester. My job is to intentionally make applications do things they’re not supposed to—finding flaws and exploiting them to ensure they’re secure. I specialize in Web, API, Android, and iOS security.