After 90 min: A secure system for storing and managing your passwords safely
Conduct Ethical Penetration Testing
After 90 min: A comprehensive penetration test report identifying security weaknesses
What you need
The 90-Minute Plan
Learn OWASP testing methodology. Understand legal and ethical constraints.
Gather information about target. Use passive and active techniques.
Test for common exploits (SQL injection, XSS, CSRF). Use automated tools.
Prove vulnerabilities with careful, controlled testing.
Write detailed report with recommendations. Present findings ethically.
Always get written permission. Stay within scope. Document everything carefully.
Keep Going
You might also try
After 90 min: A comprehensive security report identifying vulnerabilities and improvement areas
After 90 min: A reusable library of UI components for your projects and team
After 90 min: A scalable microservices architecture for a distributed application