Reflected DOM XSS – PortSwigger Write Up
Learn how to exploit a Reflected DOM XSS vulnerability in PortSwigger Lab. Step-by-step guide to identify and exploit an insecure script that processes reflected data in the DOM in a vulnerable way.
1 contribution in the year 2026
3 contributions in the year 2025
12 contributions in the year 2024
7 contributions in the year 2023
49 contributions in the year 2022
18 contributions in the year 2021
Hey there 👋. I’m Juan Antonio González Mena, although many people know me as Sikumy. I’m 24 years old and have been working in the cybersecurity world for over four years. I’m also the creator of this blog you’re reading.
Deep Hacking started as simple personal notes. Over time it grew, evolved, and through its ups and downs, has become what it is today: a space created by and for the community.
I don’t know how far this project will go or what paths it will take, but what I do know is that my goal is for it to become a technical reference. Time will tell. In the meantime, I’d love for you to join me on this journey.
Learn how to exploit a Reflected DOM XSS vulnerability in PortSwigger Lab. Step-by-step guide to identify and exploit an insecure script that processes reflected data in the DOM in a vulnerable way.
Learn how to exploit a DOM XSS in AngularJS expressions in PortSwigger Lab. Step-by-step guide to execute JavaScript through Angular expressions when angle brackets and double quotes are HTML-encoded.
Learn how to exploit DOM XSS in document.write by escaping from a select element and executing arbitrary JavaScript code.
Learn how to exploit a Reflected XSS inside a JavaScript string in PortSwigger Lab. Step-by-step guide to escape from a string and execute JavaScript code when angle brackets are HTML-encoded.
This author has not published articles yet.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏