Linked Presentation: What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques