Your Ultimate Pentesting Arsenal
Storing passwords without hashing or with weak algorithms
Transmitting sensitive data without encryption
Using obsolete or insecure encryption algorithms