Hacking the OWASP Top 10
Hacking the OWASP Top 10
Developers are always up against rigid deadlines, changing requirements, and constant production support issues. This leaves little time for keeping up with the current threats and defenses, and it inevitably makes security an afterthought. In this presentation, we will be discussing 4 of the vulnerabilities from the OWASP Top 10:
- A1: Injection
- A3: Cross-Site Scripting
- A4: Insecure Direct Object Reference
- A8: Cross-Site Request Forgery