Computer sciences and Information technology;
Week 2
1) Pick one common web application vulnerability from the OWASP Top Ten and describe how it is exploited and ways to prevent and detected attacks on the selected vulnerability (5-8
paragraphs).
2) Find one example of an open and web based CTF (like Halls of Valhalla or PICO CTF). Provide a short description and link. Try to solve at least one problem and provide a short review .