OWASP Top Ten Project
In this project, you’ll be introduced to five scenarios involving examples of common web application vulnerabilities and attacks. You’ll need to analyze examples of application log entries and payloads sent to be processed and identify the type of vulnerability that is being exploited in each scenario. What are the potential consequences of a successful exploitation? What mitigation options can be implemented?