Today, I'll solve the XSS challenges from the "Web For Pentesters" vulnerable app and analyze the code behind what we see.What does the code above do? It GET's the parameter "name" and echoes it back to the user. Also. we will not see any input sanitization on this example, so our XSS payload will look like this:In this example, the code does exact the same thing as the first one. The only difference in this one is the sanitization. The input has been defined inside the brackets and will be replacing it. Our payload will look like this:The above code does exact what the second one does. In this one, the developer also sanitizes the capital letters. Our payload will look like this:This code is absolutely different from the rest. In this one, any use of the word script capital or not, will kill the application. Our payload must not have the word script inside. Our payload will look like this:That's it for now. Stay tuned for more posts in the future...