1. Hacking Web Applications
2. Web Application Threats
3. Web Application Hacking Methods
4. Footprint Web Infrastructure
5. Analyze Web Applications
6. Bypassing Client-Side Controls
7. Authentication Mechanisms
8. Authorization Schemes
9. Access Controls
10. Session Management Mechanism
11. Injection Attacks
12. Application Logic Flaws
13. Shared Environments
14. Database Connectivity
15. Web Application Clients
16. Web Services
17. Web Application Security
18. MODULE 5 - LESSON 2 - QUIZ.html