No rate limiting
Learn about the issues that arise in an application that employs no rate limiting techniques, as well as how you can go about implementing those protections.
Learn about the risks of exposing open redirects, how to exploit them and how to mitigate them.
Learn what an insecure hash is, why you should be aware of it, and how you can implement strong hashes to remediate the vulnerability in your organization
Learn how to protect your code from directory traversal in PHP by exploiting a vulnerable web server.
Learn how to protect your PHP code from various forms of cross-site scripting (XSS) attacks.
Learn how to create SQL queries securely and avoid SQL injection attempts by malicious third parties.