3. Take Down Your Competitor’s Web Site

Setting the Stage

It’s 4:30 p.m. and Phoenix has had about all he can take from his boss today. As he gathers his belongings and gets ready to leave work, he fights the urge to go tell his boss to go jump in a lake, along with some various profanities. As Phoenix heads for the train station, his cell phone chirps to let him know he’s just received a text message. He opens it and a text message from a number that reads 0000000000 says: “The normal place at 6.” Phoenix is overcome with confusion, anger, and fear all at the same time. He knows who this message must be from. However, he threw away the phone he used to communicate with the shady Mr. Dobbs months ago, shortly after the last job he ...

Get Chained Exploits: Advanced Hacking Attacks from Start to Finish now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.