Application Security in Ethical Hacking – 5 questions