WebSockets

Check List

Methodology

Hijacking Private Data Leak

1

Log into sites that use file summarization or upload processes or artificial intelligence using websocket requests

2

Search for and identify WebSocket endpoints in Burp Suite

3

Upload a private file, start AI summary, send a message, etc

4

Keep the WebSocket connection open

5

Filter by WS, right-click the upgrade request, Copy, Copy as cURL like

GET /ai/wsio/?EIO=4&transport=websocket HTTP/2
Host: www.target.com
Cookie: session=abc123...
6

Paste into Burp Repeater, WebSocket tab

7

Create a new WebSocket connection using the same cookies (from your logged-in session)

8

Just wait, do not upload anything from this session

9

Trigger AI summary, chat message, or any real-time action

10

Go back to your Burp WebSocket, If you see messages like

{
  "contentItem": {
    "id": 987654,
    "content": "This is another user's private document...",
    "summary": "AI summary of secret file...",
    "isPublic": false
  }
}
11

WebSocket Hijacking, Private Data Leak CONFIRMED


White Box

Cheat Sheet

Last updated