This is an old revision of the document!
Contest
Testing of HTTPS sites
Exploiting XSS with 20 characters limitation
SQL Injection (SQLi)
Web Vulnerability Assessment Methodologies