•
Table of Contents .................................................................................................................... 2
Table of Figures ....................................................................................................................... 2
THE THREAT ............................................................................................................................. 3 TROJANS .......................................................................................................................................... 3 SCRIPT INJECTIONS ........................................................................................................................... 3
ATTACK OVERVIEW .................................................................................................................. 3 WEBINJECT DETAILS .......................................................................................................................... 3 ATTACK SEQUENCE ........................................................................................................................... 4 About F5 Labs ................................................................................................................................... 8
•
•
•
•
Top Related