Hey Folks, in this tutorial we are going to talk about an open source “Open Redirection” vulnerability finder tool called “OpenRedireX“. Simply tool takes the URL from the user and then it constantly tries to find open redirect issues using its own wordlist that called as “FUZZING“. If you want to get deeper information about this vulnerability then you can go here.

Key Features

  • You can specify your own payloads in ‘payloads.txt’
  • Shows Location header history (if any)
  • Fast (as it is Asynchronous)
  • Takes a url or list of urls and fuzzes them for Open redirect issues

Installation

The tool is available on github as it is an open source tool. The installation is quite simple but as we know that dependence is the most important factor during the installation of any type of tool. So we will download the dependency before starting the tool.

Now we will configure this tool in our terminal but first we have to download it from the github and then go the directory. It’s not enough as we have to execute one more python command at the end.

The installation has been completed and now we will show you the features of this tool through given image. Use the given command to launch this tool.

live Website

Here you can see that we got open redirection vulnerability in live website through this tool, but due to security policy we can show you everything.

Demo

Here you can see that we are using XVWA vulnerabale application for demonstration. If you want to do same lab setup in your localhost machine then you can go here.

Just look at the command that we mentioned below and only manipulate the URL parameter according to yourself. You can also see that the command below mentions the FUZZ keyword which is instructing the vulnerable parameter.

Usage 🙂 python3 openredirex.py -u < URL > -p < payload file > –keyword FUZZ

As you can clearly see it gives us many combinations of results from which we can exploit this vulnerability.

Don 🙂 !! We get success when we take a URL from the results and execute it on the browser and as you can see we have successfully redirected to “google.com“.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.

Leave a Reply

Your email address will not be published. Required fields are marked *