Course
In this challenge, your goal is to leverage an authentication issue in an API to gain access to sensitive information. This challenge contains the Go source code of the vulnerable code to help in learning source code review.
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.