Home arrow JavaScript arrow Programmatic POST Requests with JavaScript: Form Emulator in Action
JAVASCRIPT

Programmatic POST Requests with JavaScript: Form Emulator in Action


In the fourth and final part of our series, we examine the form emulator we built in the third part in the context of a practical example that puts the program to work. The form emulator can be used as a simple testing bed to help you build more robust and safer Web applications.

Author Info:
By: Alejandro Gervasio
Rating: 5 stars5 stars5 stars5 stars5 stars / 23
August 03, 2005
TABLE OF CONTENTS:
  1. · Programmatic POST Requests with JavaScript: Form Emulator in Action
  2. · The first step in coding the example: listing the programís functions
  3. · The second step in coding the example: defining the sample files
  4. · The third step in coding the example: running the form emulator program
  5. · The complete form emulator script: listing the full source code

print this article
SEARCH DEVARTICLES

Programmatic POST Requests with JavaScript: Form Emulator in Action
(Page 1 of 5 )

Introduction

This is the last part of the series ďProgrammatic POST Requests with JavaScript.Ē Welcome back. Throughout the previous article, I offered a full explanation of how to build a JavaScript-based form emulator program, aimed specifically at sending post requests to a given host, in order to simulate the use of Web forms for submitting potentially dangerous information.

Indeed, this http-based hacking method has become extremely popular due mainly to the extensive use of JavaScript to make asynchronous http requests without page reloads. Certainly, itís rather pointless to judge a technical tool itself within an ethical sense, either as evil or good-intended, since the responsibility for its usage relies completely on the userís purposes.

However, very often in real conditions, itís useful to consider how hacking techniques may be used to attack websites, and accordingly to improve the overall security, whether within the application and/or at administrative levels. As a result, hopefully safer Web programs will be written and more efficient security strategies will be implemented.

So, returning to the form emulator script, in the previous article I defined all the required functions to make the program fully functional. Therefore, in this last part Iíll set up a practical example that puts the program to work and demonstrates that post Web forms may be easily emulated, either with malicious purposes or for use as a simple testing bed.

Now that the articleís objectives have been defined, itís time to go forward and start coding the example.


blog comments powered by Disqus
JAVASCRIPT ARTICLES

- Project Nashorn to Make Java, JavaScript Wor...
- JavaScript Virus Attacks Tumblr Blogs
- Google Releases Stable Dart Version, JavaScr...
- Khan Academy Unveils New JavaScript Learning...
- Accessing Nitro? There`s an App for That
- JQuery 2.0 Leaving Older IE Versions Behind
- Fastest JavaScript Engine Might Surprise You
- Microsoft Adjusting Chakra for IE 10
- Brendan Eich: We Don`t Need Google Native Cl...
- An Overview of JavaScript Statements
- An Overview of JavaScript Operators
- Overview of JavaScript Variables
- More of the Top jQuery Social Plugins
- The Top jQuery Social Plugins
- More of the Top jQuery Slider Plugins

Watch our Tech Videos 
Dev Articles Forums 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Weekly Newsletter
 
Developer Updates  
Free Website Content 
Contact Us 
Site Map 
Privacy Policy 
Support 

Developer Shed Affiliates

 




© 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
Popular Web Development Topics
All Web Development Tutorials