Rating:

## Summary
“Toy Workshop” was the web challenge released on day 1 and showed off an interesting way to do a classic XSS attack. We’ll start by finding a simple web app where we can forward messages to the “manager” of the workshop. Looking at the source code, we see that the queries are stored in a SQL database, and viewed using the “puppeteer” module, which creates a browser instance to view the database(probably to emulate the “manager”). We can leverage this by writing a XSS payload to take the cookie stored in the browser, and send it to a simple webserver using ngrok to tunnel the traffic to our VM. Follow the link [here](https://an00brektn.github.io/htb-santa-toy-workshop/) to see the technical details.

Original writeup (https://an00brektn.github.io/htb-santa-toy-workshop/).