Security Validation: Looking through an attackers perspective