And how to hide executable PHP code in JPEG files.
Obtaining illegal data access using XPATH injections.
How race conditions compromise the security of financial sites.
Confuse, Spoof and Make Backdoors.
How to reconstruct source code from an exposed .git directory.
And why you should never reuse encryption keys!
And how attackers exploit common programming pitfalls to gain control.
How To Start With Security Capture The Flag Competitions.