Course
In this challenge, your goal is to leverage an authentication issue in an application to gain access to sensitive information. This challenge contains the Go source code of the vulnerable code.
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.