This presentation will initially provide a brief overview of the various methods an attacker may utilize to break your application. From there, the presenters will go into a detailed how-to of application/protocol fuzzing, showing you how to use this technique to better prepare your code for the inevitable adversary. Finally the presenters will go over SQL injection - what it is, how it works, and how you can easily avoid it.