WebSockets
Check List
Methodology
Hijacking Private Data Leak
1
Log into sites that use file summarization or upload processes or artificial intelligence using websocket requests
2
Search for and identify WebSocket endpoints in Burp Suite
3
Upload a private file, start AI summary, send a message, etc
4
Keep the WebSocket connection open
5
Filter by WS, right-click the upgrade request, Copy, Copy as cURL like
GET /ai/wsio/?EIO=4&transport=websocket HTTP/2
Host: www.target.com
Cookie: session=abc123...6
Paste into Burp Repeater, WebSocket tab
7
Create a new WebSocket connection using the same cookies (from your logged-in session)
8
Just wait, do not upload anything from this session
9
Trigger AI summary, chat message, or any real-time action
10
Go back to your Burp WebSocket, If you see messages like
{
"contentItem": {
"id": 987654,
"content": "This is another user's private document...",
"summary": "AI summary of secret file...",
"isPublic": false
}
}11
WebSocket Hijacking, Private Data Leak CONFIRMED
White Box
Cheat Sheet
Last updated