Web application security - the fast guide 1.1 | Page 113

Chapter 6 Attack execution (2)