An attack technique wherein malicious code implements a Shim between requests to modify data.