Course
This course explores the exploitation of a misconfigured Cross-Origin Resource Sharing (CORS) policy. It demonstrates how such misconfigurations can be leveraged to retrieve sensitive information from an API by tricking a user into visiting a malicious page.
Skills covered
Authentication
Client Side
Operating System
Network
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.