Find at least two XSS-vulnerable web sites; make screenshots of a successful XSS attacks and post it together with a brief information about you did the attacks.