Launch Offer: 90% off on kWAPTA certification voucher — code KSA-Launch-90-OFF

x8 the underrated tool for parameter mining

Recently I was testing some new tools recommended by one of my friend.

x8 by Sh1Yo the Hidden parameters discovery suite written in Rust This tool can Find hidden params that could potentially vulnerable to xss (cross-site scripting) sqli and other bugs.
You can find this tool here:- https://github.com/Sh1Yo/x8

So lets see a real world bug that I’ve found using this tool.

As a part of my hunting methodology, I send quite decent amount of time for dorking at google , bing & shodan. While I was enjoying my shodan dorking I found login panel

image.png

The scope was very wide .target. so I used this dork.

ssl.cert.subject.CN:"target.*"

That was a very simple login page. When I visited the site I was redirected to this url:-

target.com/some_path/some_path/some_path/login/jsp/login.jsp

Here I tried some sql injections , auth bypass but no luck. Lets find some parameters for further attack. Lets fire up the x8.

x8 -u https://target.com/some_path/some_path/some_path/login/jsp/login.jsp -w wordlist/params.txt

image.png

x8 finds a get parameter named target which was reflecting in the source code. After spending some time I’ve found an XSS using this payload:-

">%27><details/open/ontoggle=confirm(1337)>

Final PoC:-

https://target.com/some_path/some_path/some_path/login/jsp/login.jsp?target=">%27><details/open/ontoggle=confirm(1337)>

Saif

Networking & Offensive Security Specialist

Saif is a founding member of the Knight Squad community with a background in network engineering, hands-on web security testing, CTFs, and security research. He focuses on responsible vulnerability discovery and practical, real-world bug hunting workflows. Since 2023, he has been involved with the Yogosha Strike Force and has responsibly reported security findings to major organizations including Apple and Microsoft. He also contributes to the community by creating CTF challenges for competitions such as KnightCTF and BDSec CTF.