Computer sciences and Information technology;

Integrative Negotiations for divorce proceeding
August 4, 2017
Cultural Anthropology:
August 4, 2017
Show all

Computer sciences and Information technology;

Week 2

1)    Pick one common web application vulnerability from the OWASP Top Ten and describe how it is exploited and ways to prevent and detected attacks on the selected vulnerability (5-8

paragraphs).

2)    Find one example of an and web based CTF (like Halls of Valhalla or PICO CTF). Provide a short description and link. Try to solve at least one problem and provide a short review .

Leave a Reply

Your email address will not be published. Required fields are marked *