"If you dont take care of your web application vulnerabilities, phishers will." These techniques are presented together with Proof of Concept (PoC) codes which are actually used by phishers who are knowledgeable about certain aspects of cross-site scripting (XSS) exploitation. This tutorial is a nice read and definately gives you an insight into preventing yourself and the users of your website from falling a victim of phishing attacks and XSS exploitation.