HTML Injection POC Explained: Step-by-Step Guide to Vulnerability Testing