From 764486f530be6ca27ac11a17814589558487c608 Mon Sep 17 00:00:00 2001
From: ARZ <60057481+AbdullahRizwan101@users.noreply.github.com>
Date: Sun, 1 Aug 2021 07:55:39 +0500
Subject: [PATCH] Create Lab1.md
---
Portswigger/XSS/Lab1.md | 30 ++++++++++++++++++++++++++++++
1 file changed, 30 insertions(+)
create mode 100644 Portswigger/XSS/Lab1.md
diff --git a/Portswigger/XSS/Lab1.md b/Portswigger/XSS/Lab1.md
new file mode 100644
index 0000000..fe8ce45
--- /dev/null
+++ b/Portswigger/XSS/Lab1.md
@@ -0,0 +1,30 @@
+# Portswigger XSS-Lab 1
+
+## Reflected XSS into HTML context with nothing encoded
+
+In this lab we have to perform reflected cross site scripting (XSS) , first of all XSS is a vulnerability in web applications that is used to allow attackers to run javascript code on the application which can lead to running any malicious script generally they use this to steal cookies. There are 3 types of XSS , reflected , stored and DOM based XSS.
+
+The task of this lab is this to exploit reflected XSS which allows anyone to include script within the `GET` parameter of the page through which the link can be sent to anyone and on opening that link it will executed the script or javascript code.
+
+
+
+We can try searching for something
+
+
+
+Here notice the url link
+```
+https://ac281f821ff6626c80d28d9100f40098.web-security-academy.net/?search=ARZ
+```
+
+Here `?search=ARZ` , this is the GET parameter .We can try to execute javascript code like this
+
+```javascript
+
+```
+
+
+
+And this popped up the dialog box meaning that this web application is vulnerable to Reflected XSS as we can add javascript code from the GET parameter in the url.
+
+