How Do Attackers Benefit From XSS Attacks?