In previous chapters, we have seen that XSS can be used by an attacker to extract user information or perform actions on the user's behalf within the application's scope. However, with a little more effort and some well-executed social engineering labor, an attacker can use XSS to convince the user to download and execute malicious software that can be used to compromise their client computer and gain further access to the local network.
In this recipe, we will see a proof of concept for a more elaborated XSS attack that will conclude with the attacker being able to remotely execute commands on the victim's computer.