HOW I FOUND MY FIRST XSS BUG

3 hours ago 5
BOOK THIS SPACE FOR AD
ARTICLE AD

Ranjan

Let’s start with how I found my first love… oh wait, Zero, snap out of it — you’re daydreaming again! Right, back to reality. Sorry, I meant to say, how I found my first XSS! Fellow hackers, buckle up because this is a story packed with curiosity, chaos, and that unforgettable adrenaline rush when a simple pop-up alert feels like winning a boss fight. If you’re just starting your hacking journey, don’t sweat it — XSS is a beginner-friendly challenge, and I’m here to walk you through how I tackled mine. Let’s dive in!

It all started with a classic Google Dork:

site:radicated.com

After scrolling through a few pages, I thought, let’s refine this a bit. So, I switched it up:

site:radicated.*

Still not quite there, I decided to get clever and filter out unnecessary subdomains:

site:radicated.* -www -blog

This nifty trick removes the www and blog subdomain pages, making the search results much cleaner. That’s when I stumbled upon a webpage with a comment functionality.

Immediately, the thought of XSS popped into my head like a lightbulb in a cartoon.

I grabbed a simple payload and threw it into the comment box:

“><img src=x onerror=alert(‘xss’)>

To my surprise, the XSS was stored, and it worked! I couldn’t believe my luck. I was just testing, thinking the input would be sanitized. But nope — no sanitization. Boom, it worked like a charm.

For a brief moment, I felt like the king of the world. But then, reality hit me, and I remembered all the cautionary tales of irresponsible hacking. My soaring confidence quickly came back down to earth. I decided to do the right thing — I wrote up a detailed report and submitted it to the company.

If you enjoyed this write-up and want to stay connected, feel free to follow me on LinkedIn and X (formerly Twitter). Let’s grow and learn together — happy hacking! 🎯

Read Entire Article