DEV Community

Cover image for Day 7: XSS Bug Bounty Hunting β€” Find, Exploit & Report Cross-Site Scripting Bugs That Pay (2026)
Mr Elite
Mr Elite

Posted on • Originally published at securityelites.com

Day 7: XSS Bug Bounty Hunting β€” Find, Exploit & Report Cross-Site Scripting Bugs That Pay (2026)

πŸ“° Originally published on SecurityElites β€” the canonical, fully-updated version of this article.

Day 7: XSS Bug Bounty Hunting β€” Find, Exploit & Report Cross-Site Scripting Bugs That Pay (2026)

← 60-DAY BUG BOUNTY COURSE
DAY 7 OF 60
XSS BUG BOUNTY HUNTING

← Day 6: Subdomain Enumeration

Day 8: IDOR Tutorial β†’

πŸ”
Authorised targets only. Test XSS on HackerOne/Bugcrowd in-scope targets, DVWA in your home lab, or TryHackMe/HackTheBox. Never test on any application without explicit written authorisation or a bug bounty programme scope covering the target. Lab: DVWA Labs Hub.

60-DAY BUG BOUNTY COURSE PROGRESS

Day 7 / 60 β€” 11.7%

βœ… D1–D6

β–Ά D7: XSS Bug Bounty Hunting

D8: IDOR

D9–60: Β·Β·Β·

<>

In Day 6 you mapped the target β€” dev subdomains, staging servers, forgotten APIs, priority targets sorted by EOL software. In Day 5 you built the Burp Suite workflow for systematically testing every parameter you encounter. Day 7 connects both: you are now going to use Burp Repeater against those priority subdomains to hunt XSS β€” the most consistently findable web vulnerability across every bug bounty programme. XSS scales from $0 (self-XSS) to $15,000+ (stored XSS on admin panels). That entire range is the same vulnerability type. The difference is impact demonstration. A beginner who finds a stored XSS and writes a report that clearly shows account takeover earns more than an experienced hunter who writes β€œalert box appeared.”

Day 7 covers XSS hunting from end to end β€” where to look, how to test each injection context in Burp Repeater (Day 5 skill applied), filter bypasses, escalating beyond alert(1), the self-XSS trap, DOM XSS in SPAs, automation with Dalfox, and the report template that maximises your payout.

πŸ“‹ What You’ll Master in Day 7

XSS Types & Payout Ranges

Where to Hunt XSS

Burp Repeater XSS Workflow

Injection Contexts & Payloads

Filter Bypass Techniques

Escalating Impact Beyond alert(1)

DOM XSS β€” Bypasses Server Filters

Avoiding the Self-XSS Trap

Automation β€” Dalfox & kxss

Writing Reports That Get Paid

Further Reading

XSS Types & What Each Pays

Type
How It Works
Typical Payout

STORED XSS
Payload saved to DB β€” executes for every visitor. No link-click required. Affects all users automatically.
$500–$15K

REFLECTED XSS
Payload in URL reflected in immediate response. Requires victim to click a crafted link. Needs social engineering.
$100–$2K

DOM XSS
Client-side JS sink reads user input. Payload never reaches server β€” bypasses all server-side WAF filters.
$200–$3K

SELF-XSS
Only executes in attacker’s own browser. Profile field visible only to account owner. Zero impact to other users.
$0

Where to Hunt XSS β€” High-Value Injection Points

πŸ”₯ HIGHEST VALUE
Comment / review systems
User profile: name, bio
Admin panel input fields
Search reflecting query string
Error messages with URL

⚑ COMMONLY FOUND
URL path segments
Query params: ?q= ?name= ?msg=
HTTP headers (User-Agent)
JSON API responses in views
Redirect params: ?next= ?url=

πŸ”Ž DOM XSS SOURCES
location.hash (#fragment)
location.search (?param)
document.referrer
window.name
postMessage() handlers

πŸ’‘ Day 6 + Day 7 connection: The dev and staging subdomains you mapped in Day 6 often have weaker input filtering than production. Start XSS testing on those priority subdomains first β€” the same sanitisation libraries that protect production may not be configured on dev environments. Open each priority target in your Burp-proxied browser (Day 5 setup) before testing.

Burp Suite Repeater XSS Workflow β€” Day 5 Skills Applied

From Day 5 you have Burp Suite configured with Repeater as your primary testing environment. Here is exactly how to apply those skills for XSS testing β€” the same workflow used in every professional web application assessment.

securityelites.com

Burp Suite Repeater β€” XSS Testing Workflow (Authorised Target, Day 5 Proxy Setup)

STEP 1: Browse target via Burp Proxy (from Day 5) β†’ HTTP History β†’ send request to Repeater

STEP 2: Inject canary string to confirm reflection

GET /search?q=xsscanary12345 HTTP/1.1
Host: dev.target.com

Results for: xsscanary12345

← reflected in HTML context βœ“ # STEP 3: Test HTML context payload GET /search?q=

Results for:

img tag NOT encoded β†’ XSS confirmed βœ“

STEP 4: Escalate β€” demonstrate cookie theft for report

GET /search?q=

βœ“ Collaborator receives session cookie β€” account takeover demonstrated β†’ ready to report

Burp Suite Repeater XSS workflow using the Day 5 proxy setup β€” four steps: (1) browse via Burp Proxy, send interesting requests to Repeater from HTTP History, (2) inject canary string to confirm reflection and identify HTML context, (3) test img onerror payload β€” not encoded in response confirms XSS, (4) escalate to cookie exfiltration using Burp Collaborator for the impact demonstration in the report. The cookie fetch uses btoa() to base64-encode the value before exfiltration. This four-step process is the standard professional XSS confirmation workflow.

─── XSS testing workflow in Burp Repeater ──────────────────────

1. Browse target via Burp Proxy (Day 5 setup) # 2. HTTP History β†’ find requests with user input in response # 3. Right-click β†’ Send to Repeater # 4. Inject canary string β€” confirm reflection context q=xsscanary12345 β†’ check where it appears in the response




─── Identify the reflection context ───────────────────────────

xsscanary12345

# β†’ HTML context var q = β€œxsscanary12345”; # β†’ JS string context # β†’ HTML attribute context

Injection Contexts β€” Match Your Payload to the Context

The most common reason beginners fail to confirm XSS on a genuinely vulnerable parameter is using the wrong payload for the injection context. Always confirm context with your canary string before testing payloads.


πŸ“– Read the complete guide on SecurityElites

This article continues with deeper technical detail, screenshots, code samples, and an interactive lab walk-through. Read the full article on SecurityElites β†’


This article was originally written and published by the SecurityElites team. For more cybersecurity tutorials, ethical hacking guides, and CTF walk-throughs, visit SecurityElites.

Top comments (0)