Hey Folks, in this tutorial we are going to talk about an open source “Open Redirection” vulnerability finder tool called “OpenRedireX“. Simply tool takes the URL from the user and then it constantly tries to find open redirect issues using its own wordlist that called as “FUZZING“. If you want to get deeper information about this vulnerability then you can go here.
The tool is available on github as it is an open source tool. The installation is quite simple but as we know that dependence is the most important factor during the installation of any type of tool. So we will download the dependency before starting the tool.
apt-get install python3-venv
Now we will configure this tool in our terminal but first we have to download it from the github and then go the directory. It’s not enough as we have to execute one more python command at the end.
git clone https://github.com/devanshbatham/OpenRedireX
cd OpenRedireX
python3 -m venv env
python3 openredirex.py
The installation has been completed and now we will show you the features of this tool through given image. Use the given command to launch this tool.
python3 openredirex.py --help
Here you can see that we got open redirection vulnerability in live website through this tool, but due to security policy we can show you everything.
Here you can see that we are using XVWA vulnerabale application for demonstration. If you want to do same lab setup in your localhost machine then you can go here.
Just look at the command that we mentioned below and only manipulate the URL parameter according to yourself. You can also see that the command below mentions the FUZZ keyword which is instructing the vulnerable parameter.
Usage 🙂 python3 openredirex.py -u < URL > -p < payload file > –keyword FUZZ
python3 openredirex.py -u "http://192.168.1.10/xvwa/vulnerabilities/redirect/redirect.php?forward=FUZZ" -p payloads.txt --keyword FUZZ
As you can clearly see it gives us many combinations of results from which we can exploit this vulnerability.
Don 🙂 !! We get success when we take a URL from the results and execute it on the browser and as you can see we have successfully redirected to “google.com“.
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.
The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…
Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…
Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
This website uses cookies.