Overview
Syllabus
Intro
About David
What is OWASP
Components with known vulnerabilities
Misconfigurations
Sensitive Data Exposure
View Source
Post vs Get
Broken Authentication Session Management
Insecure Direct Object References
Path Manipulation
Access Control
False Change
Crosssite request forgery
Crosssite scripting
Utility
Security
View Page Source
Image Source
XSS
Cookies
Browser Exploit Tools
Multiple Submission Web Forms
Web Pen Testing
Form Submission
Expose
Burp Suite
Ajax
Darkness
Injection
Error Messages
Training Tool
Magic Strings
Single Quote Space
Fail
Missing Space
Adding Space
Database Cleanup
Sequel Map
Run as root
Command shell stored procedures