Can demonstrate the ability to identify, explain and prove the existence of the following types of network infrastructure vulnerabilities and exposures: • XXE • XML Injection • LDAP Injection • ORM injection • SSI injection XPath injection • IMAP/SMTP injection • Code injection • OS Commanding