First page Back Continue Last page Overview Graphics
Overview
Examples – embedded devices gone bad
Brief introduction to HTTP
Authentication bypass
Cross-site scripting (XSS)
Cross-site request forgery (XSRF)
SQL (?) injection
Additional threats
General web and application security