For DOM-based XSS, examine the source and trace the flow to any sinks in the DOM, then test payloads that interact with these sinks.
Use simple JavaScript like prompt(document.domain) to test for execution.
Take note of successful payloads and their outcomes.
Consider all possible filter bypass techniques based on the application's behavior.
Use automated scanning tools to identify potential XSS vulnerabilities. However, manual confirmation is necessary, as automated tools can generate false positives and negatives.
Test how different browsers interpret the payloads. Some browsers may encode or decode inputs differently, affecting payload delivery.
Verify that the payload is stored and executed across sessions or different user accounts, confirming a stored XSS vulnerability.