Summary
This chapter introduced standard web application vulnerabilities. We started by looking at injection attacks. Next, we looked at broken authentication and session management. We then discussed request forgery attacks. To defend against the standard attacks discussed, we explored programming language-specific defenses.
In the next chapter, we will drill into database security and look at defenses against SQL injection.