XSS – An End-To-End Example

Throughout this book, we look at bugs on deliberately-vulnerable teaching sites as well as live applications belonging to real companies – that way, we can see vulnerabilities as they exist in the wild while also having sections where you can follow along at home.