Throwback Thursday | Exploiting Persistent XSS

Ken “s1ngular1ty” Pyle explores the world of exploiting Cross-Site Scripting (XSS) vulnerabilities on Layer 2 devices like routers and switches. He demonstrates how seemingly innocent XSS or unsanitized input vectors can be transformed into covert network protocols, enabling the routing and file transfer between isolated, air-gapped networks without the need for a router.