March 28, 2021
At the end of March 2021 the Belgian ethical hacking platform Intigriti hosted a new XSS (cross site scripting) challenge.
The POC video shows first the Intigriti page with the default note. Then the victim visits a regular website (google.com) like he is browsing the internet. After that the victim visits the attackers website and automatically the victim is redirected to the Intigriti page that now contains our XSS payload due to the CSRF token being bypassed. The attackers website redirect in the video takes 20 seconds but this is set like that for debugging purposes and can be done faster.
Embedded writeup PDF: