Hidden Field Manipulation
• Cookie Poisoning
• Backdoors and debug options
• Application buffer overflows
• Stealth commanding
• 3rd party misconfigurations
• Known vulnerabilities
• Parameter tempering
• Cross site scripting
• Forceful browsing
• Hacking over SSL
• Sourcecode Disclosure
• Web Server Architecture Attack
• SQL Injection
• Java Script Injection