Throwback Thursday | Exploiting Persistent XSS
Ken “s1ngular1ty” Pyle explores the world of exploiting Cross-Site Scripting (XSS) vulnerabilities on Layer 2 devices like routers and switches. He demonstrates how seemingly innocent XSS or unsanitized input vectors can be transformed into covert network protocols, enabling the routing and file transfer between isolated, air-gapped networks without the need for a router.