Security Assessment In Software Development
Jump to : https://portswigger.net/web-security
There will be four vulnerabilities listed and you can select SQL INJECTION or CROSS SITE SCRIPTING and complete all the options/tasks in the selected vulnerability.
You need to prepare a detailed report on how you successfully completed the tasks with possible screenshots and steps followed. The screenshots must contain the timestamp as a proof of your work.