How I Hacked 100+ Accounts Using Just XSS
文章描述了一次通过反射型跨站脚本(RXSS)漏洞攻击大型博客平台子域名jp.redacted.com的过程,利用Base64编码绕过过滤机制,成功窃取了100多个用户账户的cookie。 2025-6-6 05:11:19 Author: infosecwriteups.com(查看原文) 阅读量:10 收藏

One Small Flaw, 100+ Accounts Stolen — Here’s How It Happened

Ibtissam hammadi

It started as a routine bug bounty hunt. But I found no other Cross-Site Scripting (XSS) bug — it was a goldmine for Account Takeover (ATO).

By the end of this read, you’ll know:

  • How a single XSS flaw exposed 100+ user accounts.
  • The sneaky Base64 trick that bypassed filters.
  • The exact payload that stole cookies like a thief in the night.

Let’s rewind the story…

The Target: A Million-User Blog Platform

The target was redacted.com (name changed for privacy), a massive blogging site with millions of users.

Subdomains are often the weakest link, so I ran a quick scan and found jp.redacted.com.

Little did I know, this subdomain would hand me the keys to 100+ accounts.

The Discovery: Reflected XSS (RXSS) Strikes Again

Using Param Spider, I listed all parameters with this command:

paramspider -d jp.redacted.com -s

One parameter stood out: s=.


文章来源: https://infosecwriteups.com/how-i-hacked-100-accounts-using-just-xss-7cd61aa785c9?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh