Attacker "Ad" (atk.zzz2.dev)
Disguised as an ad. Embeds testapp to poison shared localStorage.
Phase 1: Steal Data
Read Victim's Tokens
Phase 2: Poison Storage
Overwrite user_token
Overwrite session_id
Inject malicious config
Phase 3: Full Attack
Run Full Attack Sequence
Stolen data will appear here...