Now that you've mastered the art of squashing bugs, it's time to take your skills to the next level. In this chapter, you'll learn how to reverse-engineer the hacking skills of your enemies and use them against them.
Warning: this section requires a strong stomach and a willingness to get a little messy.
Phishing 101: Stealing the Cookie from the JAR SQL Injection: Injecting Your Own Flavor into the Database CSRF: Stealing the Cookies from the Cookie Jar (again)