XSS Exploitation

Learn how to exploit the three main types of XSS vulnerabilities with the OWASP Juice Shop.

Overview

Considering the different types of XSS attacks we’ve discussed, it’s fair to assume that the overall process of finding such vulnerabilities is not all that difficult. Despite modern browsers and frameworks having simplified web application development, sometimes a developer has to actually make an effort to add security bugs to their application. Nevertheless, it’s still quite important to know how these vulnerabilities are exploited before delegating the task to an automated tool or service.

Exploiting XSS vulnerabilities

Websites are rendered on the browser (alongside site business logic) as a combination of HTML, CSS, and JavaScript. This means that as long as the browser trusts the sources of the code, ...