Hi hackers,
I found an XSS vulnerability in a site that allows me to steal session tokens from users. I realize that I can use these session tokens to authenticate as the victim. However, when I connect to the site through Burp in another browser, I have to change the cookie in a LOT of requests, and it is very tedious. How do black hats do this in practice? Isn’t there a faster way to use a victim’s session token to authenticate as them?
I’d also like to note that I have not exploited this vulnerability on an account that wasn’t my own and I have no intention to.