Web Security

We learned the danger of trusting or making assumptions about user’s input to web applications.

Identifying vulnerable code

Vulnerabilities in your code

You have probably implemented some web applications. Using your own experience building an application, discuss with your peers and brainstorm about: