This video provides a practical look at how AI is lowering the barrier to entry for complex web exploits, making sophisticated security concepts accessible to a wider audience. It serves as a timely reminder that as offensive tools evolve through automation, our defensive strategies must become equally intelligent.
深掘り
前提条件
- データがありません。
次のステップ
- データがありません。
深掘り
I Used AI to Exploit XSS Vulnerabilitiesインデックス作成:
Support The Channel: https://www.pwnb4y.com/ - ClaudeCode Free: https://youtu.be/N6KSaQNUWuo - Discord Server: https://discord.gg/ue2va3jYq4 - Discord: @z1l0x - Business Email: z1l0x@proton.me - Affilates: ✨ Learn Python (FREE): https://scrimba.com/learn-python-c03?via=zilox Tags: #Ai #xss #hacking
Check this out.
I'm here in my Linux system and we've got a web app running locally. It's called Voln Poetry. It looks like a simple poetry web app. You can read some cool poetry here.
And it is kind of like that, but additionally, it is full of bugs.
Like this web app is vulnerable to cross-site scripting vectors.
Now in this video, I'll be trying to teach you what cross-site scripting is, how it works under the hood, and what harm an attacker can cause with it to you and your web app. So I've got Grok running alongside this web app and we're also going to take some help from it throughout this video. The web app has multiple cross-site scripting vectors, so it'd be fun to exploit. And if you're new here, maybe hit that subscribe button to help us grow this channel.
Now if you're unaware of what cross-site scripting or XSS is, let me tell you a bit about it.
Cross-site scripting or XSS is a type of vulnerability in which an attacker gets malicious HTML or JavaScript snippets rendered by the web browser.
The key thing to understand here is that the browser has no idea whether that script came from the actual website developer or from an attacker.
It just runs it. That's what makes this so dangerous. The browser trusts the page and if the page has your malicious code on it, the browser will execute it without asking any questions.
For example, you can see a search box here.
Now if I do a simple search for something like romance, it shows no results for us.
Also, if you pay a bit of attention to the word romance, it looks the same.
Nothing unusual with it, right?
Now if we go back and instead of just typing the word, we do some HTML, like use HTML tags. You might know about them, right? For example, the H1 tag, which is used for headings. So if we want to show the word romance as a heading, we type something like the opening H1 tag, then the word romance, then the closing one.
Now as soon as I press search, you can see the word romance is bigger in size compared to the previous example where it was just small.
This confirms that the HTML we're giving to the search box is being rendered by the web app without any checks. Just to confirm it again, we've got the U tag which underlines text. So, if we give a payload like this which starts with the opening U tag, then our word romance, then the closing U tag, and click search, we can see a small underline under the word romance. Interesting, right? Well, not yet because it gets really interesting when we can run JavaScript using the script tag, too.
For example, something like this. In this simple payload, we have a starting script tag. If you've done a bit of web development, you might know about it.
Then we're using the alert function.
I've written "subscribe" inside it which is just going to give us a pop-up.
Then we close the script tag.
Now, as soon as I click search, it shows us the pop-up which says "subscribe".
Now, I know what you're thinking. Okay, cool. A pop-up, big deal.
But think about it this way.
If we can run an alert, we can run any JavaScript. And JavaScript on a web page can do a lot of things. It can read your cookies, redirect you to another page, make requests on your behalf, steal form data, even silently log everything you type. That is the real threat here.
This is what cross-site scripting or XSS is. It is one of the most commonly found and high severity vulnerabilities in web apps because it can damage a web app pretty badly, which I'm going to show you in just a moment. But before that, we've got other types of XSS in this web app, too, and we need to find them.
By the way, this one is called reflected XSS because, as you could see, we were able to trigger that pop-up.
The reason it's called reflected is because the server takes our input and reflects it right back in the response without storing it anywhere. You typically exploit this by crafting a malicious URL and tricking someone into clicking it, like through a phishing message or a shortened link.
But we have two more types, stored XSS and DOM-based XSS.
The reflected one is the least dangerous of the three, mainly because it requires the victim to click a specific link.
Whereas the other types are way more passive and dangerous. Anyway, I asked Grok where I could find stored XSS and it gave me a list. The most suitable one here for us is the comment section. In our poems, we can leave a reflection for other users to read, kind of like a comment. Now, XSS found here is going to be way more dangerous. Let me show you how.
So, for the attacker name, I'm not going to do anything special, just going to put something random.
But in the reflection field, I put this payload.
It's another very infamous XSS payload and if I kind of break it down for you, we use an image tag and for its source, we give it X.
But it expects a valid image path, right?
Because of that, this image tag is going to raise an error.
Now, we've specified a condition that on error, we want to execute this part.
As you can read, we're triggering another alert which says subscribe.
So, now as soon as I post the reflection, I can see the pop-up.
But it doesn't end here because now this comment is stored in the website's database.
This is why it's called stored XSS. The payload isn't just reflected once, it's permanently saved and served to every single visitor.
For example, if I copy the URL for this poem and open a completely new browser and visit the link, you can see the pop-up again. And it's going to be the same for every user who visits that page. In real cases, obviously it's just a local web app, but imagine in an actual web app, a hacker found a stored XSS on a popular page that gets thousands of visitors a day. Every single one of those visitors would be running the attacker's JavaScript without knowing it. Now, they can do a couple of things with that.
First is cookie theft, which I already wanted to show you in reflected XSS, but I'll show it here instead.
So, instead of showing the subscribe alert, we can actually grab the cookies of the user using this XSS snippet. Now, instead of showing the subscribe text, it'll show us the website's cookies. And if you've seen any of my recent videos, you might know what hackers can do with your cookies. Basically, they can hijack your session and log in as you without ever needing your password. It does also require a few other security features to be turned off in order to grab cookies via JavaScript like the HTTP only flag needs to be missing, but that approach is getting a bit old now because most modern web apps do set that flag.
One thing hackers can still do though is website defacement.
You might have seen those pages where a website is completely replaced with a hacker's own content, sometimes with a political message or just to show off.
That's called defacement.
And it's pretty easy to pull off if a hacker has stored XSS on the page. For example, let me show you one quick demo here. Instead of showing cookies, we can run some JavaScript that replaces the entire page content. And now, whenever someone visits this page, they'll see this instead of the actual website content.
That's how a lot of defacements happen.
It's not always some crazy server exploit. Sometimes it's just XSS and a few lines of JavaScript.
Stored XSS is way more dangerous than reflected, but still many web apps today come well sanitized against these kinds of attacks. Those who do still find bugs like these though get paid a pretty good amount of money through bug bounty programs.
Some researchers have made thousands of dollars just from a single stored XSS on a well-known platform, so it's definitely worth knowing how to find these.
Now, the last type of XSS is DOM-based.
It's quite different from stored XSS, but somewhat similar to reflected. It's a type of XSS where the vulnerability exists in the client-side JavaScript code, not on the server. The malicious payload is executed because the JavaScript on the page takes data from the user, usually from the URL, and inserts it directly into the DOM without properly sanitizing it first.
The interesting thing about DOM-based XSS is that the server never even sees the malicious payload in most cases.
Everything happens entirely in the browser, which also makes it harder to detect server-side.
Traditional security filters on the back end won't help here because the back end isn't even involved in the vulnerable part of the flow. In our web app, we can find a DOM-based XSS on the profile page. As you can see here, we've got a URL, and everything specified after the hash symbol is reflected on the page. Like if I type my name, it shows it over there. This means this endpoint could likely be vulnerable to DOM-based XSS. Now, if I replace the whole URL with this crafted URL, our site has been defaced again. That is what DOM-based XSS is. Simple, but effective, and surprisingly common even in modern web apps. So, those were the three main types of XSS, reflected, stored, and DOM-based.
I tried my best to walk you through all of them with real examples so you actually understand what's happening rather than just memorizing the names.
But, it's not like these can only be found on these specific endpoints, or that it's always this straightforward to find.
XSS can literally be anywhere.
Any place where user input touches the page is a potential vector. And a lot of times it is sanitized. They take your input and strip out those tags, so XSS never triggers.
But, bypassing those filters is a whole topic on its own, and there are tons of creative ways to get around basic sanitization, which we might cover in a future video.
XSS can also be found in HTTP headers, which we're going to cover in the next video, hopefully. There's also something called blind XSS, where your payload fires in a completely different context, in like an admin panel, and you don't even see it happen directly.
That one is super interesting, and we'll definitely get into it eventually.
That's enough for this one, I think. I hope you enjoyed this video. If you did, make sure to subscribe and like the video for more content like this. And if you want to support the channel, maybe check out the first link in the description. Until we meet next time, happy hacking and peace out.
関連おすすめ
Ubuntu Touch Q&A 190
UBports
241 views•2026-05-17
Learning k8s ep. 3 - The end of the VM
devcentral
102 views•2026-05-15
Iterators and Generators: Real Use Cases
jsmentor-uk
188 views•2026-05-17
TCS NQT Coding Questions Solution (One Shot) | TCS NQT Preparation 2027 | TCS Actual PYQ 2026
knacademy20
2K views•2026-05-17
The 4 Bit AI Training Trick
explaquiz
414 views•2026-05-19
Image to 3D World Workflow 👀
badxstudio
843 views•2026-05-16
Why Learn Algorithms in the AI Era
bitsandproofs
245 views•2026-05-17
NFA - Transition Diagram and Transition Table
nesoacademy
198 views•2026-05-19











