Exploited many vulnerabilities in a simulated environment, including Cross-site Scripting, SQL Injection, Cookie Theft, and Password Theft. Also exploited many instances of buffer overflow, including a vulnerability in a program utilizing malloc().