--- description: >- source: https://medium.com/@shari7a0x/how-i-hacked-nasa-and-get-8-bugs-e5cd397a6af9 --- # 🔎 How I hacked NASA and got 8 bugs ?
Hi hackers , I will explain , How did i get 8 bugs in NASA . It’s about 7 cross site scripting (xss) and one open redirect . First step collect subdomains and check live domains . I always use tool [**subfinder**](https://github.com/projectdiscovery/subfinder) and add to it some API’s . I always use tool **HTTPX** . ``` subfinder -d host.com -silent | httpx -mc 200 -o live txt ``` second step collecting parameters . I always use two tools [**paramspider**](https://github.com/devanshbatham/ParamSpider) and [**waybackurls**](https://github.com/tomnomnom/waybackurls) . wait , are you real to collect parameters form domains by yourself ? it’s many subdomains and paraspider can’t automate this alone . I use simple bash script ,to automate collect parameters from subdomains . ``` for URL in $( little not before run this script you should open directory of Paramspider . **what after this ?** You want to check parameters if you can add (tags <>) .or not I used [**KXSS**](https://github.com/Emoe/kxss) **,** it’s very nice tool but not work at all the time . ``` Cat parameters.txt |kxss ```

done .

what after this ?

I can write html code .

You can use tool for discovering hidden parameters also like [**Arjun**](https://github.com/s0md3v/Arjun) and check parameters if it work, you can use tool like [**dalfox**](https://github.com/hahwul/dalfox) very cool tool . ``` Arjun -u host.com ``` ``` Dalfox url host.com?parameters=xss ```

boom xss is done .

You can use automation by [**NUCL**](https://github.com/projectdiscovery/nuclei)**EI .** [**templates**](https://github.com/projectdiscovery/fuzzing-templates) **.** ``` Nuclei -l parameters -t /fuzzing-templates/xss ``` I get open redirect by NUCLEI . ``` cat parameters.txt | grep "redirect" | NUCLEI -t /fuzzing-templates/redirect/open-redirect.yaml ``` if you think i finish you are wrong .

lol .

but that are two bug only , where are others ? after i got first xss i had an idea , i can use some google dorks . google dorks for xss !!!! yep . some google dorks for discovering parameters site:\*.host.com ext:asp site:\*.host.com ext:jsp site:\*.host.com ext:aspx site:\*.host.com ext:jspx site:\*.host.com ext:do site:\*.host.com ext:action I use them but didn't have useful parameters . I check subdomain if i can use it to search about it in google . I found something doesn’t see it usually it’s **`index.cgi .`** I asked myself why didn’t try to use google dorks about it . site: \*.host.com ext:cgi site:\*.nasa.gov inurl:index.cgi I see good result , i checked this result it’s like last domain ,that i had found xss in it ,I tried to use same parameter lol it is working nice . I checked about 11 domains but 7 had xss .
thinks for reading . give me feedback . can you follow me in [**linked in**](https://www.linkedin.com/in/shai7a0x/) and [**twitter**](https://twitter.com/Shari7a0X)