Version ebook / Retour
Using OWASP Mutillidae II, let's determine whether the application allows HPP attacks.