Tags: web xss utctf 

Rating: 4.0

For this challenge we were faced with a chat room with Brad Pid himself!
There was a warning though, we could not be rude to Brad because we admins would check the chats.

With this in mind, we start by trying a simple [XSS injection](https://owasp.org/www-community/attacks/xss/).

```html
<body onload=alert('test1')>
```

Hitting send caused the alert to trigger!
So now lets make it a bit more complex, we need some endpoint to make requests to.
I used [Webhook.site](https://webhook.site), it gives me an url to make requests to and logs everything.

Before getting into the script, we need to decide what to steal.
In our case, when looking at the cookies there is one that stands out, the `secret`.

We'll steal them!

My final script looked like:

```html

```

Which sent the flag to the given endpoint.

Original writeup (https://jmg-duarte.github.io/posts/ctfs/utctf/chatt/).