Basics
Reconnaissance and Information gathering
Authentication and Authorization attacks
Injection Attacks