Contest
Determine if your computer is hacked
Exploiting XSS with 20 characters limitation
SQL Injection (SQLi)
Testing of HTTPS sites
Web Vulnerability Assessment Methodologies