Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this lesson, participants learn definitions: web applications often direct users to other web sites and use this information. If the validation is not proper, attackers can re-direct users toward malicious content and take their personal information. This lesson also discusses some Java code samples; specifically focusing on location.replace (some URL). The instructor also presents a case study, this particular one is on water holes, which is a term used to describe an attacker-controlled web site that is the landing page for re-directed victims.