Using the application code, you will further examine the potential for attack and defense in the areas of input validation, access control, and session management.
Click here to access the code (you will need to modify the code based on the questions below).
Create a report in a 2- to 3-page Microsoft Word document addressing the following:
• Locate the PHP code for validating the user's login information. Use the variables defined there to restrict the content page to only those who have successfully logged into the system.
• Describe how the session is managed from page to page in the application. How long is the session active by default? What conditions will end the session?
• Identify the form validation rules that need to be put in place for the login form and the registration form. What format should the data have? What is the maximum length of each item? Identify the necessary functions in JavaScript and PHP to create these validation rules and list them in your report.