Cross-Origin Resource Sharing

Bookmarked!

This exercise covers Cross-Origin Resource Sharing and how it can be used to bypass CSRF protection if it's misconfigured

PRO Medium -- 0
Course

This course teaches you how to exploit a misconfigured Cross-Origin Resource Sharing (CORS) policy to bypass Cross-Site Request Forgery (CSRF) protection. You'll learn how to reset an administrator's password by leveraging weak CORS policies.

Skills covered
Client Side Network
Included with PRO
Full course content Common mistakes

Ready to practice?

Get access to this lab and 600+ hands-on exercises with a PRO subscription.