1. Open Metasploitable and Kali Linux :

  2. XSS Reflected

  3. XSS Stored


  1. Dedicated Vuln Site XSS with text
  2. XSS with image
  3. Fill site with the image

SQL Injection Attack