We have already seen the reasons why we should push to consider the security problem in the development of our websites, no matter how complicated or who commissioned them (“Security and Web sites: what it means and why you should not underestimate on the internet?”), now let’s move on to examine in detail the functioning of these sites, to search for possible points of attack.