Learn how you can gain access to possibly sensitive resources not referenced anywhere in a web application

Find out how modifying some values in your browser can trick a server into returning sensitive information

See how a misconfiguration in server settings can let you explore the files on a remote server

Learn about one of the most common Web App vulnerabilities and how it can be used to bypass authentication