Overview: -- The Principles of a Web Application Penetration Test -- Pre-engagement -- Footprinting -- Attacking User Controls -- Attacking Application Inputs -- Common Attack Methods -- Discovering Logic Flaws -- Reporting