To get clues about the XML code and the functions being called, attackers often like to use null functions to receive messages back from the server. Because Ajax requests are based on XMLHTTP ...